Jul 2 08:58:04.928715 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 08:58:04.928743 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:58:04.928758 kernel: BIOS-provided physical RAM map: Jul 2 08:58:04.928767 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 08:58:04.928774 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 08:58:04.928782 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 08:58:04.928791 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Jul 2 08:58:04.928815 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Jul 2 08:58:04.928827 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 2 08:58:04.928835 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 08:58:04.928842 kernel: NX (Execute Disable) protection: active Jul 2 08:58:04.928850 kernel: SMBIOS 2.8 present. Jul 2 08:58:04.928858 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Jul 2 08:58:04.928866 kernel: Hypervisor detected: KVM Jul 2 08:58:04.928876 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 08:58:04.928886 kernel: kvm-clock: cpu 0, msr 17192001, primary cpu clock Jul 2 08:58:04.928894 kernel: kvm-clock: using sched offset of 7113931573 cycles Jul 2 08:58:04.928904 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 08:58:04.928912 kernel: tsc: Detected 1996.249 MHz processor Jul 2 08:58:04.928921 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 08:58:04.928930 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 08:58:04.928939 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Jul 2 08:58:04.928947 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 08:58:04.928958 kernel: ACPI: Early table checksum verification disabled Jul 2 08:58:04.928967 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Jul 2 08:58:04.928976 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:58:04.928984 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:58:04.928993 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:58:04.929002 kernel: ACPI: FACS 0x000000007FFE0000 000040 Jul 2 08:58:04.929011 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:58:04.929019 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 08:58:04.929028 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Jul 2 08:58:04.929039 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Jul 2 08:58:04.929048 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Jul 2 08:58:04.929056 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Jul 2 08:58:04.929065 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Jul 2 08:58:04.929073 kernel: No NUMA configuration found Jul 2 08:58:04.929082 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Jul 2 08:58:04.929090 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Jul 2 08:58:04.929099 kernel: Zone ranges: Jul 2 08:58:04.929113 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 08:58:04.929122 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Jul 2 08:58:04.929131 kernel: Normal empty Jul 2 08:58:04.929140 kernel: Movable zone start for each node Jul 2 08:58:04.929149 kernel: Early memory node ranges Jul 2 08:58:04.929158 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 08:58:04.929169 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Jul 2 08:58:04.929178 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Jul 2 08:58:04.929187 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 08:58:04.929196 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 08:58:04.929205 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Jul 2 08:58:04.929214 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 2 08:58:04.929223 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 08:58:04.929232 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 08:58:04.929241 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 08:58:04.929250 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 08:58:04.929261 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 08:58:04.929270 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 08:58:04.929279 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 08:58:04.929288 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 08:58:04.929297 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 08:58:04.929306 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Jul 2 08:58:04.929315 kernel: Booting paravirtualized kernel on KVM Jul 2 08:58:04.929324 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 08:58:04.929333 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 08:58:04.929344 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 08:58:04.929354 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 08:58:04.929362 kernel: pcpu-alloc: [0] 0 1 Jul 2 08:58:04.929371 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Jul 2 08:58:04.929380 kernel: kvm-guest: PV spinlocks disabled, no host support Jul 2 08:58:04.929389 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Jul 2 08:58:04.929398 kernel: Policy zone: DMA32 Jul 2 08:58:04.929409 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:58:04.929421 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 08:58:04.929430 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 08:58:04.929440 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 08:58:04.929449 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 08:58:04.929458 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 123076K reserved, 0K cma-reserved) Jul 2 08:58:04.929467 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 08:58:04.929476 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 08:58:04.929485 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 08:58:04.929496 kernel: rcu: Hierarchical RCU implementation. Jul 2 08:58:04.929506 kernel: rcu: RCU event tracing is enabled. Jul 2 08:58:04.929515 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 08:58:04.929525 kernel: Rude variant of Tasks RCU enabled. Jul 2 08:58:04.929534 kernel: Tracing variant of Tasks RCU enabled. Jul 2 08:58:04.929543 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 08:58:04.929552 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 08:58:04.929561 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 08:58:04.929570 kernel: Console: colour VGA+ 80x25 Jul 2 08:58:04.929581 kernel: printk: console [tty0] enabled Jul 2 08:58:04.929590 kernel: printk: console [ttyS0] enabled Jul 2 08:58:04.929598 kernel: ACPI: Core revision 20210730 Jul 2 08:58:04.929608 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 08:58:04.929616 kernel: x2apic enabled Jul 2 08:58:04.929625 kernel: Switched APIC routing to physical x2apic. Jul 2 08:58:04.929634 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 2 08:58:04.929643 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 2 08:58:04.929653 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Jul 2 08:58:04.929662 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jul 2 08:58:04.929673 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jul 2 08:58:04.929682 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 08:58:04.929691 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 08:58:04.929700 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 08:58:04.929710 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 08:58:04.929718 kernel: Speculative Store Bypass: Vulnerable Jul 2 08:58:04.929727 kernel: x86/fpu: x87 FPU will use FXSAVE Jul 2 08:58:04.929736 kernel: Freeing SMP alternatives memory: 32K Jul 2 08:58:04.929745 kernel: pid_max: default: 32768 minimum: 301 Jul 2 08:58:04.929756 kernel: LSM: Security Framework initializing Jul 2 08:58:04.929765 kernel: SELinux: Initializing. Jul 2 08:58:04.929774 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 08:58:04.929784 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 08:58:04.929794 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Jul 2 08:58:04.929816 kernel: Performance Events: AMD PMU driver. Jul 2 08:58:04.929826 kernel: ... version: 0 Jul 2 08:58:04.929834 kernel: ... bit width: 48 Jul 2 08:58:04.929844 kernel: ... generic registers: 4 Jul 2 08:58:04.929862 kernel: ... value mask: 0000ffffffffffff Jul 2 08:58:04.929872 kernel: ... max period: 00007fffffffffff Jul 2 08:58:04.929881 kernel: ... fixed-purpose events: 0 Jul 2 08:58:04.929893 kernel: ... event mask: 000000000000000f Jul 2 08:58:04.929902 kernel: signal: max sigframe size: 1440 Jul 2 08:58:04.929912 kernel: rcu: Hierarchical SRCU implementation. Jul 2 08:58:04.929921 kernel: smp: Bringing up secondary CPUs ... Jul 2 08:58:04.929931 kernel: x86: Booting SMP configuration: Jul 2 08:58:04.929942 kernel: .... node #0, CPUs: #1 Jul 2 08:58:04.929951 kernel: kvm-clock: cpu 1, msr 17192041, secondary cpu clock Jul 2 08:58:04.929961 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Jul 2 08:58:04.929970 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 08:58:04.929979 kernel: smpboot: Max logical packages: 2 Jul 2 08:58:04.929989 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Jul 2 08:58:04.929998 kernel: devtmpfs: initialized Jul 2 08:58:04.930009 kernel: x86/mm: Memory block size: 128MB Jul 2 08:58:04.930028 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 08:58:04.930048 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 08:58:04.930057 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 08:58:04.930067 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 08:58:04.930076 kernel: audit: initializing netlink subsys (disabled) Jul 2 08:58:04.930086 kernel: audit: type=2000 audit(1719910684.180:1): state=initialized audit_enabled=0 res=1 Jul 2 08:58:04.930095 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 08:58:04.930105 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 08:58:04.930114 kernel: cpuidle: using governor menu Jul 2 08:58:04.930123 kernel: ACPI: bus type PCI registered Jul 2 08:58:04.930135 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 08:58:04.930145 kernel: dca service started, version 1.12.1 Jul 2 08:58:04.930155 kernel: PCI: Using configuration type 1 for base access Jul 2 08:58:04.930164 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 08:58:04.930174 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 08:58:04.930184 kernel: ACPI: Added _OSI(Module Device) Jul 2 08:58:04.930195 kernel: ACPI: Added _OSI(Processor Device) Jul 2 08:58:04.930204 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 08:58:04.930214 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 08:58:04.930227 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 08:58:04.930238 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 08:58:04.930248 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 08:58:04.930258 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 08:58:04.930268 kernel: ACPI: Interpreter enabled Jul 2 08:58:04.930278 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 08:58:04.930288 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 08:58:04.930298 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 08:58:04.930309 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jul 2 08:58:04.930322 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 08:58:04.930502 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 08:58:04.930603 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 08:58:04.930617 kernel: acpiphp: Slot [3] registered Jul 2 08:58:04.930625 kernel: acpiphp: Slot [4] registered Jul 2 08:58:04.930633 kernel: acpiphp: Slot [5] registered Jul 2 08:58:04.930641 kernel: acpiphp: Slot [6] registered Jul 2 08:58:04.930652 kernel: acpiphp: Slot [7] registered Jul 2 08:58:04.930660 kernel: acpiphp: Slot [8] registered Jul 2 08:58:04.930668 kernel: acpiphp: Slot [9] registered Jul 2 08:58:04.930676 kernel: acpiphp: Slot [10] registered Jul 2 08:58:04.930683 kernel: acpiphp: Slot [11] registered Jul 2 08:58:04.930691 kernel: acpiphp: Slot [12] registered Jul 2 08:58:04.930699 kernel: acpiphp: Slot [13] registered Jul 2 08:58:04.930707 kernel: acpiphp: Slot [14] registered Jul 2 08:58:04.930714 kernel: acpiphp: Slot [15] registered Jul 2 08:58:04.930722 kernel: acpiphp: Slot [16] registered Jul 2 08:58:04.930732 kernel: acpiphp: Slot [17] registered Jul 2 08:58:04.930740 kernel: acpiphp: Slot [18] registered Jul 2 08:58:04.930747 kernel: acpiphp: Slot [19] registered Jul 2 08:58:04.930755 kernel: acpiphp: Slot [20] registered Jul 2 08:58:04.930763 kernel: acpiphp: Slot [21] registered Jul 2 08:58:04.930771 kernel: acpiphp: Slot [22] registered Jul 2 08:58:04.930778 kernel: acpiphp: Slot [23] registered Jul 2 08:58:04.930786 kernel: acpiphp: Slot [24] registered Jul 2 08:58:04.930794 kernel: acpiphp: Slot [25] registered Jul 2 08:58:04.930825 kernel: acpiphp: Slot [26] registered Jul 2 08:58:04.930833 kernel: acpiphp: Slot [27] registered Jul 2 08:58:04.930841 kernel: acpiphp: Slot [28] registered Jul 2 08:58:04.930848 kernel: acpiphp: Slot [29] registered Jul 2 08:58:04.930857 kernel: acpiphp: Slot [30] registered Jul 2 08:58:04.930864 kernel: acpiphp: Slot [31] registered Jul 2 08:58:04.930872 kernel: PCI host bridge to bus 0000:00 Jul 2 08:58:04.930964 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 08:58:04.931042 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 08:58:04.931126 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 08:58:04.931205 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jul 2 08:58:04.931282 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Jul 2 08:58:04.931359 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 08:58:04.931469 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 08:58:04.931571 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 08:58:04.931675 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jul 2 08:58:04.931766 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Jul 2 08:58:04.931880 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 2 08:58:04.931969 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 2 08:58:04.932058 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 2 08:58:04.932146 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 2 08:58:04.932244 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 08:58:04.932340 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jul 2 08:58:04.932429 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jul 2 08:58:04.932527 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Jul 2 08:58:04.932619 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Jul 2 08:58:04.932725 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Jul 2 08:58:04.940864 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Jul 2 08:58:04.940976 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Jul 2 08:58:04.941066 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 08:58:04.941164 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jul 2 08:58:04.941253 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Jul 2 08:58:04.941340 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Jul 2 08:58:04.941428 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Jul 2 08:58:04.941515 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Jul 2 08:58:04.941614 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jul 2 08:58:04.941702 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jul 2 08:58:04.941789 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Jul 2 08:58:04.941910 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Jul 2 08:58:04.942011 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Jul 2 08:58:04.942099 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Jul 2 08:58:04.942186 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Jul 2 08:58:04.942284 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 08:58:04.942373 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Jul 2 08:58:04.942460 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Jul 2 08:58:04.942473 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 08:58:04.942483 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 08:58:04.942491 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 08:58:04.942500 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 08:58:04.942509 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 08:58:04.942521 kernel: iommu: Default domain type: Translated Jul 2 08:58:04.942530 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 08:58:04.942614 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jul 2 08:58:04.942701 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 08:58:04.942787 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jul 2 08:58:04.942816 kernel: vgaarb: loaded Jul 2 08:58:04.942826 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 08:58:04.942835 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 08:58:04.942843 kernel: PTP clock support registered Jul 2 08:58:04.942855 kernel: PCI: Using ACPI for IRQ routing Jul 2 08:58:04.942864 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 08:58:04.942872 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 08:58:04.942881 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Jul 2 08:58:04.942890 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 08:58:04.942899 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 08:58:04.942907 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 08:58:04.942916 kernel: pnp: PnP ACPI init Jul 2 08:58:04.943196 kernel: pnp 00:03: [dma 2] Jul 2 08:58:04.943219 kernel: pnp: PnP ACPI: found 5 devices Jul 2 08:58:04.943228 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 08:58:04.943237 kernel: NET: Registered PF_INET protocol family Jul 2 08:58:04.943245 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 08:58:04.943254 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 2 08:58:04.943263 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 08:58:04.943272 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 08:58:04.943281 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 08:58:04.943292 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 2 08:58:04.943300 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 08:58:04.943309 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 08:58:04.943318 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 08:58:04.943326 kernel: NET: Registered PF_XDP protocol family Jul 2 08:58:04.943559 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 08:58:04.943644 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 08:58:04.943722 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 08:58:04.943798 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jul 2 08:58:04.943913 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Jul 2 08:58:04.944004 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jul 2 08:58:04.944094 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 08:58:04.944182 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 08:58:04.944195 kernel: PCI: CLS 0 bytes, default 64 Jul 2 08:58:04.944204 kernel: Initialise system trusted keyrings Jul 2 08:58:04.944213 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 2 08:58:04.944222 kernel: Key type asymmetric registered Jul 2 08:58:04.944234 kernel: Asymmetric key parser 'x509' registered Jul 2 08:58:04.944243 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 08:58:04.944251 kernel: io scheduler mq-deadline registered Jul 2 08:58:04.944260 kernel: io scheduler kyber registered Jul 2 08:58:04.944268 kernel: io scheduler bfq registered Jul 2 08:58:04.944277 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 08:58:04.944287 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jul 2 08:58:04.944295 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 08:58:04.944304 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jul 2 08:58:04.944315 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 08:58:04.944323 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 08:58:04.944332 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 08:58:04.944341 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 08:58:04.944349 kernel: random: crng init done Jul 2 08:58:04.944358 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 08:58:04.944366 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 08:58:04.944375 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 08:58:04.944461 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 2 08:58:04.944547 kernel: rtc_cmos 00:04: registered as rtc0 Jul 2 08:58:04.944628 kernel: rtc_cmos 00:04: setting system clock to 2024-07-02T08:58:04 UTC (1719910684) Jul 2 08:58:04.944734 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Jul 2 08:58:04.944750 kernel: NET: Registered PF_INET6 protocol family Jul 2 08:58:04.944760 kernel: Segment Routing with IPv6 Jul 2 08:58:04.944769 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 08:58:04.944779 kernel: NET: Registered PF_PACKET protocol family Jul 2 08:58:04.944788 kernel: Key type dns_resolver registered Jul 2 08:58:04.947859 kernel: IPI shorthand broadcast: enabled Jul 2 08:58:04.947874 kernel: sched_clock: Marking stable (743006766, 120332030)->(920171552, -56832756) Jul 2 08:58:04.947884 kernel: registered taskstats version 1 Jul 2 08:58:04.947894 kernel: Loading compiled-in X.509 certificates Jul 2 08:58:04.947905 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 08:58:04.947914 kernel: Key type .fscrypt registered Jul 2 08:58:04.947924 kernel: Key type fscrypt-provisioning registered Jul 2 08:58:04.947934 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 08:58:04.947958 kernel: ima: Allocated hash algorithm: sha1 Jul 2 08:58:04.947968 kernel: ima: No architecture policies found Jul 2 08:58:04.947977 kernel: clk: Disabling unused clocks Jul 2 08:58:04.947987 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 08:58:04.947996 kernel: Write protecting the kernel read-only data: 28672k Jul 2 08:58:04.948006 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 08:58:04.948016 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 08:58:04.948026 kernel: Run /init as init process Jul 2 08:58:04.948035 kernel: with arguments: Jul 2 08:58:04.948044 kernel: /init Jul 2 08:58:04.948056 kernel: with environment: Jul 2 08:58:04.948065 kernel: HOME=/ Jul 2 08:58:04.948075 kernel: TERM=linux Jul 2 08:58:04.948084 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 08:58:04.948097 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 08:58:04.948110 systemd[1]: Detected virtualization kvm. Jul 2 08:58:04.948121 systemd[1]: Detected architecture x86-64. Jul 2 08:58:04.948133 systemd[1]: Running in initrd. Jul 2 08:58:04.948143 systemd[1]: No hostname configured, using default hostname. Jul 2 08:58:04.948153 systemd[1]: Hostname set to . Jul 2 08:58:04.948164 systemd[1]: Initializing machine ID from VM UUID. Jul 2 08:58:04.948174 systemd[1]: Queued start job for default target initrd.target. Jul 2 08:58:04.948185 systemd[1]: Started systemd-ask-password-console.path. Jul 2 08:58:04.948195 systemd[1]: Reached target cryptsetup.target. Jul 2 08:58:04.948205 systemd[1]: Reached target paths.target. Jul 2 08:58:04.948217 systemd[1]: Reached target slices.target. Jul 2 08:58:04.948227 systemd[1]: Reached target swap.target. Jul 2 08:58:04.948237 systemd[1]: Reached target timers.target. Jul 2 08:58:04.948248 systemd[1]: Listening on iscsid.socket. Jul 2 08:58:04.948259 systemd[1]: Listening on iscsiuio.socket. Jul 2 08:58:04.948269 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 08:58:04.948279 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 08:58:04.948290 systemd[1]: Listening on systemd-journald.socket. Jul 2 08:58:04.948302 systemd[1]: Listening on systemd-networkd.socket. Jul 2 08:58:04.948312 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 08:58:04.948323 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 08:58:04.948333 systemd[1]: Reached target sockets.target. Jul 2 08:58:04.948353 systemd[1]: Starting kmod-static-nodes.service... Jul 2 08:58:04.948366 systemd[1]: Finished network-cleanup.service. Jul 2 08:58:04.948378 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 08:58:04.948389 systemd[1]: Starting systemd-journald.service... Jul 2 08:58:04.948399 systemd[1]: Starting systemd-modules-load.service... Jul 2 08:58:04.948410 systemd[1]: Starting systemd-resolved.service... Jul 2 08:58:04.948421 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 08:58:04.948431 systemd[1]: Finished kmod-static-nodes.service. Jul 2 08:58:04.948442 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 08:58:04.948457 systemd-journald[184]: Journal started Jul 2 08:58:04.948529 systemd-journald[184]: Runtime Journal (/run/log/journal/23e8f2835b3246fea3d7dae8619027b0) is 4.9M, max 39.5M, 34.5M free. Jul 2 08:58:04.943491 systemd-modules-load[185]: Inserted module 'overlay' Jul 2 08:58:04.999572 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 08:58:04.999608 systemd[1]: Started systemd-journald.service. Jul 2 08:58:04.999624 kernel: audit: type=1130 audit(1719910684.993:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:04.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:04.961396 systemd-resolved[186]: Positive Trust Anchors: Jul 2 08:58:05.004868 kernel: audit: type=1130 audit(1719910684.999:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.004888 kernel: Bridge firewalling registered Jul 2 08:58:04.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:04.961407 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 08:58:05.009455 kernel: audit: type=1130 audit(1719910685.004:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:04.961450 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 08:58:05.015646 kernel: audit: type=1130 audit(1719910685.009:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:04.964499 systemd-resolved[186]: Defaulting to hostname 'linux'. Jul 2 08:58:05.000204 systemd[1]: Started systemd-resolved.service. Jul 2 08:58:05.004448 systemd-modules-load[185]: Inserted module 'br_netfilter' Jul 2 08:58:05.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.030897 kernel: audit: type=1130 audit(1719910685.025:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.005537 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 08:58:05.010050 systemd[1]: Reached target nss-lookup.target. Jul 2 08:58:05.016856 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 08:58:05.018046 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 08:58:05.026206 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 08:58:05.042848 kernel: SCSI subsystem initialized Jul 2 08:58:05.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.043422 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 08:58:05.049681 kernel: audit: type=1130 audit(1719910685.043:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.044940 systemd[1]: Starting dracut-cmdline.service... Jul 2 08:58:05.060735 dracut-cmdline[203]: dracut-dracut-053 Jul 2 08:58:05.065066 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 08:58:05.072416 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 08:58:05.072444 kernel: device-mapper: uevent: version 1.0.3 Jul 2 08:58:05.072455 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 08:58:05.077748 systemd-modules-load[185]: Inserted module 'dm_multipath' Jul 2 08:58:05.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.078753 systemd[1]: Finished systemd-modules-load.service. Jul 2 08:58:05.085878 kernel: audit: type=1130 audit(1719910685.078:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.079935 systemd[1]: Starting systemd-sysctl.service... Jul 2 08:58:05.093218 systemd[1]: Finished systemd-sysctl.service. Jul 2 08:58:05.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.098821 kernel: audit: type=1130 audit(1719910685.092:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.141849 kernel: Loading iSCSI transport class v2.0-870. Jul 2 08:58:05.161830 kernel: iscsi: registered transport (tcp) Jul 2 08:58:05.188387 kernel: iscsi: registered transport (qla4xxx) Jul 2 08:58:05.188483 kernel: QLogic iSCSI HBA Driver Jul 2 08:58:05.222702 systemd[1]: Finished dracut-cmdline.service. Jul 2 08:58:05.224241 systemd[1]: Starting dracut-pre-udev.service... Jul 2 08:58:05.229558 kernel: audit: type=1130 audit(1719910685.222:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.291886 kernel: raid6: sse2x4 gen() 12147 MB/s Jul 2 08:58:05.308843 kernel: raid6: sse2x4 xor() 4609 MB/s Jul 2 08:58:05.325862 kernel: raid6: sse2x2 gen() 13190 MB/s Jul 2 08:58:05.342907 kernel: raid6: sse2x2 xor() 8446 MB/s Jul 2 08:58:05.359909 kernel: raid6: sse2x1 gen() 10772 MB/s Jul 2 08:58:05.377700 kernel: raid6: sse2x1 xor() 6673 MB/s Jul 2 08:58:05.377763 kernel: raid6: using algorithm sse2x2 gen() 13190 MB/s Jul 2 08:58:05.377791 kernel: raid6: .... xor() 8446 MB/s, rmw enabled Jul 2 08:58:05.378576 kernel: raid6: using ssse3x2 recovery algorithm Jul 2 08:58:05.393898 kernel: xor: measuring software checksum speed Jul 2 08:58:05.396724 kernel: prefetch64-sse : 17245 MB/sec Jul 2 08:58:05.396792 kernel: generic_sse : 15704 MB/sec Jul 2 08:58:05.396851 kernel: xor: using function: prefetch64-sse (17245 MB/sec) Jul 2 08:58:05.515882 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 08:58:05.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.534000 audit: BPF prog-id=7 op=LOAD Jul 2 08:58:05.533189 systemd[1]: Finished dracut-pre-udev.service. Jul 2 08:58:05.535000 audit: BPF prog-id=8 op=LOAD Jul 2 08:58:05.537017 systemd[1]: Starting systemd-udevd.service... Jul 2 08:58:05.570581 systemd-udevd[385]: Using default interface naming scheme 'v252'. Jul 2 08:58:05.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.581992 systemd[1]: Started systemd-udevd.service. Jul 2 08:58:05.587134 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 08:58:05.615849 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Jul 2 08:58:05.667629 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 08:58:05.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.670962 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 08:58:05.740842 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 08:58:05.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:05.820857 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Jul 2 08:58:05.830859 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 08:58:05.830931 kernel: GPT:17805311 != 41943039 Jul 2 08:58:05.830944 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 08:58:05.830955 kernel: GPT:17805311 != 41943039 Jul 2 08:58:05.830965 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 08:58:05.830975 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:58:05.855845 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (437) Jul 2 08:58:05.864960 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 08:58:05.911898 kernel: libata version 3.00 loaded. Jul 2 08:58:05.911924 kernel: ata_piix 0000:00:01.1: version 2.13 Jul 2 08:58:05.912115 kernel: scsi host0: ata_piix Jul 2 08:58:05.912254 kernel: scsi host1: ata_piix Jul 2 08:58:05.912412 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Jul 2 08:58:05.912428 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Jul 2 08:58:05.912478 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 08:58:05.916870 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 08:58:05.921083 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 08:58:05.925185 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 08:58:05.927921 systemd[1]: Starting disk-uuid.service... Jul 2 08:58:05.943272 disk-uuid[461]: Primary Header is updated. Jul 2 08:58:05.943272 disk-uuid[461]: Secondary Entries is updated. Jul 2 08:58:05.943272 disk-uuid[461]: Secondary Header is updated. Jul 2 08:58:05.950843 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:58:05.954831 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:58:07.053860 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 08:58:07.054922 disk-uuid[462]: The operation has completed successfully. Jul 2 08:58:07.129717 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 08:58:07.131786 systemd[1]: Finished disk-uuid.service. Jul 2 08:58:07.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.154013 systemd[1]: Starting verity-setup.service... Jul 2 08:58:07.192924 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Jul 2 08:58:07.280732 systemd[1]: Found device dev-mapper-usr.device. Jul 2 08:58:07.283429 systemd[1]: Mounting sysusr-usr.mount... Jul 2 08:58:07.287327 systemd[1]: Finished verity-setup.service. Jul 2 08:58:07.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.411815 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 08:58:07.413182 systemd[1]: Mounted sysusr-usr.mount. Jul 2 08:58:07.414877 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 08:58:07.416770 systemd[1]: Starting ignition-setup.service... Jul 2 08:58:07.419909 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 08:58:07.435053 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:58:07.435125 kernel: BTRFS info (device vda6): using free space tree Jul 2 08:58:07.435138 kernel: BTRFS info (device vda6): has skinny extents Jul 2 08:58:07.452167 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 08:58:07.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.465505 systemd[1]: Finished ignition-setup.service. Jul 2 08:58:07.467059 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 08:58:07.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.546000 audit: BPF prog-id=9 op=LOAD Jul 2 08:58:07.545763 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 08:58:07.548533 systemd[1]: Starting systemd-networkd.service... Jul 2 08:58:07.580422 systemd-networkd[633]: lo: Link UP Jul 2 08:58:07.580436 systemd-networkd[633]: lo: Gained carrier Jul 2 08:58:07.581736 systemd-networkd[633]: Enumeration completed Jul 2 08:58:07.581988 systemd-networkd[633]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:58:07.583159 systemd[1]: Started systemd-networkd.service. Jul 2 08:58:07.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.584606 systemd[1]: Reached target network.target. Jul 2 08:58:07.584779 systemd-networkd[633]: eth0: Link UP Jul 2 08:58:07.584783 systemd-networkd[633]: eth0: Gained carrier Jul 2 08:58:07.587618 systemd[1]: Starting iscsiuio.service... Jul 2 08:58:07.597990 systemd[1]: Started iscsiuio.service. Jul 2 08:58:07.599678 systemd[1]: Starting iscsid.service... Jul 2 08:58:07.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.604056 iscsid[638]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 08:58:07.606819 iscsid[638]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 08:58:07.606819 iscsid[638]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 08:58:07.606819 iscsid[638]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 08:58:07.606819 iscsid[638]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 08:58:07.606819 iscsid[638]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 08:58:07.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.606205 systemd[1]: Started iscsid.service. Jul 2 08:58:07.608026 systemd[1]: Starting dracut-initqueue.service... Jul 2 08:58:07.609960 systemd-networkd[633]: eth0: DHCPv4 address 172.24.4.73/24, gateway 172.24.4.1 acquired from 172.24.4.1 Jul 2 08:58:07.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.620943 systemd[1]: Finished dracut-initqueue.service. Jul 2 08:58:07.621665 systemd[1]: Reached target remote-fs-pre.target. Jul 2 08:58:07.623115 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 08:58:07.624401 systemd[1]: Reached target remote-fs.target. Jul 2 08:58:07.626638 systemd[1]: Starting dracut-pre-mount.service... Jul 2 08:58:07.635654 systemd[1]: Finished dracut-pre-mount.service. Jul 2 08:58:07.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.831125 ignition[557]: Ignition 2.14.0 Jul 2 08:58:07.831160 ignition[557]: Stage: fetch-offline Jul 2 08:58:07.831288 ignition[557]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:58:07.831337 ignition[557]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:58:07.833685 ignition[557]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:58:07.836857 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 08:58:07.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:07.833941 ignition[557]: parsed url from cmdline: "" Jul 2 08:58:07.833951 ignition[557]: no config URL provided Jul 2 08:58:07.833964 ignition[557]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 08:58:07.841779 systemd[1]: Starting ignition-fetch.service... Jul 2 08:58:07.833985 ignition[557]: no config at "/usr/lib/ignition/user.ign" Jul 2 08:58:07.833999 ignition[557]: failed to fetch config: resource requires networking Jul 2 08:58:07.835009 ignition[557]: Ignition finished successfully Jul 2 08:58:07.866228 ignition[656]: Ignition 2.14.0 Jul 2 08:58:07.866252 ignition[656]: Stage: fetch Jul 2 08:58:07.866521 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:58:07.866564 ignition[656]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:58:07.869285 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:58:07.869631 ignition[656]: parsed url from cmdline: "" Jul 2 08:58:07.869642 ignition[656]: no config URL provided Jul 2 08:58:07.869657 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 08:58:07.869679 ignition[656]: no config at "/usr/lib/ignition/user.ign" Jul 2 08:58:07.875293 ignition[656]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Jul 2 08:58:07.875358 ignition[656]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Jul 2 08:58:07.876513 ignition[656]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Jul 2 08:58:08.256126 ignition[656]: GET result: OK Jul 2 08:58:08.256248 ignition[656]: parsing config with SHA512: d40b65699b4a935205a4bccdc0bf7c3003b5184c2de08c25375edfe9774e0096df18b460140e2092c6dc4ad44220f464a00c124ea8d0289dd218dd7f29bc5a4d Jul 2 08:58:08.267911 unknown[656]: fetched base config from "system" Jul 2 08:58:08.267958 unknown[656]: fetched base config from "system" Jul 2 08:58:08.268979 ignition[656]: fetch: fetch complete Jul 2 08:58:08.267986 unknown[656]: fetched user config from "openstack" Jul 2 08:58:08.268994 ignition[656]: fetch: fetch passed Jul 2 08:58:08.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.272006 systemd[1]: Finished ignition-fetch.service. Jul 2 08:58:08.269096 ignition[656]: Ignition finished successfully Jul 2 08:58:08.276340 systemd[1]: Starting ignition-kargs.service... Jul 2 08:58:08.298357 ignition[662]: Ignition 2.14.0 Jul 2 08:58:08.298387 ignition[662]: Stage: kargs Jul 2 08:58:08.298636 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:58:08.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.313137 systemd[1]: Finished ignition-kargs.service. Jul 2 08:58:08.298682 ignition[662]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:58:08.301047 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:58:08.303185 ignition[662]: kargs: kargs passed Jul 2 08:58:08.316449 systemd[1]: Starting ignition-disks.service... Jul 2 08:58:08.303284 ignition[662]: Ignition finished successfully Jul 2 08:58:08.337681 ignition[668]: Ignition 2.14.0 Jul 2 08:58:08.337709 ignition[668]: Stage: disks Jul 2 08:58:08.338021 ignition[668]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:58:08.338070 ignition[668]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:58:08.341707 ignition[668]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:58:08.343915 ignition[668]: disks: disks passed Jul 2 08:58:08.344019 ignition[668]: Ignition finished successfully Jul 2 08:58:08.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.345571 systemd[1]: Finished ignition-disks.service. Jul 2 08:58:08.347783 systemd[1]: Reached target initrd-root-device.target. Jul 2 08:58:08.350137 systemd[1]: Reached target local-fs-pre.target. Jul 2 08:58:08.352368 systemd[1]: Reached target local-fs.target. Jul 2 08:58:08.354662 systemd[1]: Reached target sysinit.target. Jul 2 08:58:08.356924 systemd[1]: Reached target basic.target. Jul 2 08:58:08.361150 systemd[1]: Starting systemd-fsck-root.service... Jul 2 08:58:08.413693 systemd-fsck[675]: ROOT: clean, 614/1628000 files, 124057/1617920 blocks Jul 2 08:58:08.479341 systemd[1]: Finished systemd-fsck-root.service. Jul 2 08:58:08.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.483187 systemd[1]: Mounting sysroot.mount... Jul 2 08:58:08.503862 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 08:58:08.504343 systemd[1]: Mounted sysroot.mount. Jul 2 08:58:08.505641 systemd[1]: Reached target initrd-root-fs.target. Jul 2 08:58:08.508621 systemd[1]: Mounting sysroot-usr.mount... Jul 2 08:58:08.512068 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 08:58:08.516144 systemd[1]: Starting flatcar-openstack-hostname.service... Jul 2 08:58:08.517467 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 08:58:08.517536 systemd[1]: Reached target ignition-diskful.target. Jul 2 08:58:08.521040 systemd[1]: Mounted sysroot-usr.mount. Jul 2 08:58:08.564152 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 08:58:08.571432 systemd[1]: Starting initrd-setup-root.service... Jul 2 08:58:08.587054 initrd-setup-root[687]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 08:58:08.598795 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (682) Jul 2 08:58:08.609882 initrd-setup-root[695]: cut: /sysroot/etc/group: No such file or directory Jul 2 08:58:08.620702 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:58:08.620937 kernel: BTRFS info (device vda6): using free space tree Jul 2 08:58:08.620972 kernel: BTRFS info (device vda6): has skinny extents Jul 2 08:58:08.634425 initrd-setup-root[719]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 08:58:08.645365 initrd-setup-root[729]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 08:58:08.649836 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 08:58:08.743991 systemd[1]: Finished initrd-setup-root.service. Jul 2 08:58:08.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.746572 systemd[1]: Starting ignition-mount.service... Jul 2 08:58:08.749084 systemd[1]: Starting sysroot-boot.service... Jul 2 08:58:08.766188 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 08:58:08.766397 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 08:58:08.819825 ignition[750]: INFO : Ignition 2.14.0 Jul 2 08:58:08.819825 ignition[750]: INFO : Stage: mount Jul 2 08:58:08.819825 ignition[750]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:58:08.819825 ignition[750]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:58:08.819825 ignition[750]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:58:08.824559 ignition[750]: INFO : mount: mount passed Jul 2 08:58:08.824559 ignition[750]: INFO : Ignition finished successfully Jul 2 08:58:08.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.826903 systemd[1]: Finished ignition-mount.service. Jul 2 08:58:08.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.834341 systemd[1]: Finished sysroot-boot.service. Jul 2 08:58:08.865102 coreos-metadata[681]: Jul 02 08:58:08.864 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 2 08:58:08.883336 coreos-metadata[681]: Jul 02 08:58:08.883 INFO Fetch successful Jul 2 08:58:08.883336 coreos-metadata[681]: Jul 02 08:58:08.883 INFO wrote hostname ci-3510-3-5-e-23fb10d09f.novalocal to /sysroot/etc/hostname Jul 2 08:58:08.887509 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Jul 2 08:58:08.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:08.887733 systemd[1]: Finished flatcar-openstack-hostname.service. Jul 2 08:58:08.890971 systemd[1]: Starting ignition-files.service... Jul 2 08:58:08.903549 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 08:58:08.922927 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (758) Jul 2 08:58:08.930200 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 08:58:08.930261 kernel: BTRFS info (device vda6): using free space tree Jul 2 08:58:08.930288 kernel: BTRFS info (device vda6): has skinny extents Jul 2 08:58:08.944297 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 08:58:08.967753 ignition[777]: INFO : Ignition 2.14.0 Jul 2 08:58:08.967753 ignition[777]: INFO : Stage: files Jul 2 08:58:08.970495 ignition[777]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:58:08.970495 ignition[777]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:58:08.970495 ignition[777]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:58:08.977171 ignition[777]: DEBUG : files: compiled without relabeling support, skipping Jul 2 08:58:08.977171 ignition[777]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 08:58:08.977171 ignition[777]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 08:58:08.983416 ignition[777]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 08:58:08.983416 ignition[777]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 08:58:08.987663 ignition[777]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 08:58:08.987663 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 2 08:58:08.987663 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 08:58:08.987663 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 08:58:08.987663 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 08:58:08.987663 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 08:58:08.987663 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 08:58:08.987663 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 08:58:08.984457 unknown[777]: wrote ssh authorized keys file for user: core Jul 2 08:58:09.008127 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Jul 2 08:58:09.429586 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 2 08:58:09.599976 systemd-networkd[633]: eth0: Gained IPv6LL Jul 2 08:58:11.289776 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Jul 2 08:58:11.289776 ignition[777]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 08:58:11.289776 ignition[777]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 08:58:11.289776 ignition[777]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 08:58:11.299294 ignition[777]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 08:58:11.299294 ignition[777]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 08:58:11.299294 ignition[777]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 08:58:11.299294 ignition[777]: INFO : files: files passed Jul 2 08:58:11.299294 ignition[777]: INFO : Ignition finished successfully Jul 2 08:58:11.329220 kernel: kauditd_printk_skb: 27 callbacks suppressed Jul 2 08:58:11.329309 kernel: audit: type=1130 audit(1719910691.303:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.301571 systemd[1]: Finished ignition-files.service. Jul 2 08:58:11.305782 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 08:58:11.341931 kernel: audit: type=1130 audit(1719910691.330:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.326765 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 08:58:11.360330 kernel: audit: type=1130 audit(1719910691.341:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.360376 kernel: audit: type=1131 audit(1719910691.341:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.360716 initrd-setup-root-after-ignition[800]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 08:58:11.327639 systemd[1]: Starting ignition-quench.service... Jul 2 08:58:11.330648 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 08:58:11.331890 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 08:58:11.331970 systemd[1]: Finished ignition-quench.service. Jul 2 08:58:11.342489 systemd[1]: Reached target ignition-complete.target. Jul 2 08:58:11.361716 systemd[1]: Starting initrd-parse-etc.service... Jul 2 08:58:11.386853 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 08:58:11.387049 systemd[1]: Finished initrd-parse-etc.service. Jul 2 08:58:11.397028 kernel: audit: type=1130 audit(1719910691.387:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.397059 kernel: audit: type=1131 audit(1719910691.387:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.388676 systemd[1]: Reached target initrd-fs.target. Jul 2 08:58:11.397789 systemd[1]: Reached target initrd.target. Jul 2 08:58:11.399138 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 08:58:11.400530 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 08:58:11.418944 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 08:58:11.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.427150 systemd[1]: Starting initrd-cleanup.service... Jul 2 08:58:11.427888 kernel: audit: type=1130 audit(1719910691.419:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.442432 systemd[1]: Stopped target nss-lookup.target. Jul 2 08:58:11.443681 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 08:58:11.444952 systemd[1]: Stopped target timers.target. Jul 2 08:58:11.446107 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 08:58:11.446984 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 08:58:11.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.448385 systemd[1]: Stopped target initrd.target. Jul 2 08:58:11.454849 kernel: audit: type=1131 audit(1719910691.447:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.455666 systemd[1]: Stopped target basic.target. Jul 2 08:58:11.456716 systemd[1]: Stopped target ignition-complete.target. Jul 2 08:58:11.458111 systemd[1]: Stopped target ignition-diskful.target. Jul 2 08:58:11.459488 systemd[1]: Stopped target initrd-root-device.target. Jul 2 08:58:11.460907 systemd[1]: Stopped target remote-fs.target. Jul 2 08:58:11.462331 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 08:58:11.463780 systemd[1]: Stopped target sysinit.target. Jul 2 08:58:11.465233 systemd[1]: Stopped target local-fs.target. Jul 2 08:58:11.466490 systemd[1]: Stopped target local-fs-pre.target. Jul 2 08:58:11.467996 systemd[1]: Stopped target swap.target. Jul 2 08:58:11.469336 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 08:58:11.475287 kernel: audit: type=1131 audit(1719910691.470:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.469575 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 08:58:11.471095 systemd[1]: Stopped target cryptsetup.target. Jul 2 08:58:11.481892 kernel: audit: type=1131 audit(1719910691.476:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.476168 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 08:58:11.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.476374 systemd[1]: Stopped dracut-initqueue.service. Jul 2 08:58:11.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.477798 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 08:58:11.478047 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 08:58:11.482962 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 08:58:11.483166 systemd[1]: Stopped ignition-files.service. Jul 2 08:58:11.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.485859 systemd[1]: Stopping ignition-mount.service... Jul 2 08:58:11.487267 systemd[1]: Stopping iscsiuio.service... Jul 2 08:58:11.496486 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 08:58:11.496788 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 08:58:11.500236 systemd[1]: Stopping sysroot-boot.service... Jul 2 08:58:11.508686 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 08:58:11.509994 ignition[815]: INFO : Ignition 2.14.0 Jul 2 08:58:11.509994 ignition[815]: INFO : Stage: umount Jul 2 08:58:11.509994 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 08:58:11.509994 ignition[815]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 2 08:58:11.509994 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 2 08:58:11.509994 ignition[815]: INFO : umount: umount passed Jul 2 08:58:11.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.510411 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 08:58:11.526165 ignition[815]: INFO : Ignition finished successfully Jul 2 08:58:11.513461 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 08:58:11.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.513616 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 08:58:11.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.515871 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 08:58:11.517473 systemd[1]: Stopped iscsiuio.service. Jul 2 08:58:11.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.519675 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 08:58:11.519772 systemd[1]: Stopped ignition-mount.service. Jul 2 08:58:11.522279 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 08:58:11.522595 systemd[1]: Finished initrd-cleanup.service. Jul 2 08:58:11.525543 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 08:58:11.525630 systemd[1]: Stopped ignition-disks.service. Jul 2 08:58:11.527715 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 08:58:11.527757 systemd[1]: Stopped ignition-kargs.service. Jul 2 08:58:11.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.528359 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 08:58:11.528403 systemd[1]: Stopped ignition-fetch.service. Jul 2 08:58:11.529759 systemd[1]: Stopped target network.target. Jul 2 08:58:11.530896 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 08:58:11.530942 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 08:58:11.531970 systemd[1]: Stopped target paths.target. Jul 2 08:58:11.538788 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 08:58:11.542015 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 08:58:11.542750 systemd[1]: Stopped target slices.target. Jul 2 08:58:11.543278 systemd[1]: Stopped target sockets.target. Jul 2 08:58:11.544066 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 08:58:11.544096 systemd[1]: Closed iscsid.socket. Jul 2 08:58:11.544543 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 08:58:11.544578 systemd[1]: Closed iscsiuio.socket. Jul 2 08:58:11.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.545067 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 08:58:11.545116 systemd[1]: Stopped ignition-setup.service. Jul 2 08:58:11.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.545718 systemd[1]: Stopping systemd-networkd.service... Jul 2 08:58:11.562000 audit: BPF prog-id=6 op=UNLOAD Jul 2 08:58:11.546554 systemd[1]: Stopping systemd-resolved.service... Jul 2 08:58:11.548503 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 08:58:11.554865 systemd-networkd[633]: eth0: DHCPv6 lease lost Jul 2 08:58:11.564000 audit: BPF prog-id=9 op=UNLOAD Jul 2 08:58:11.557282 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 08:58:11.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.557395 systemd[1]: Stopped systemd-resolved.service. Jul 2 08:58:11.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.560560 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 08:58:11.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.560695 systemd[1]: Stopped systemd-networkd.service. Jul 2 08:58:11.563202 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 08:58:11.563238 systemd[1]: Closed systemd-networkd.socket. Jul 2 08:58:11.564950 systemd[1]: Stopping network-cleanup.service... Jul 2 08:58:11.565535 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 08:58:11.565596 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 08:58:11.568364 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 08:58:11.568404 systemd[1]: Stopped systemd-sysctl.service. Jul 2 08:58:11.569682 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 08:58:11.569723 systemd[1]: Stopped systemd-modules-load.service. Jul 2 08:58:11.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.570564 systemd[1]: Stopping systemd-udevd.service... Jul 2 08:58:11.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.578381 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 08:58:11.582690 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 08:58:11.582934 systemd[1]: Stopped network-cleanup.service. Jul 2 08:58:11.583975 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 08:58:11.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.584104 systemd[1]: Stopped systemd-udevd.service. Jul 2 08:58:11.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.585753 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 08:58:11.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.585793 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 08:58:11.587036 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 08:58:11.587078 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 08:58:11.588099 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 08:58:11.588142 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 08:58:11.589146 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 08:58:11.589187 systemd[1]: Stopped dracut-cmdline.service. Jul 2 08:58:11.590267 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 08:58:11.590318 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 08:58:11.592197 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 08:58:11.599142 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 08:58:11.599237 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 08:58:11.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.600942 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 08:58:11.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.601042 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 08:58:11.814891 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 08:58:11.815287 systemd[1]: Stopped sysroot-boot.service. Jul 2 08:58:11.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.819089 systemd[1]: Reached target initrd-switch-root.target. Jul 2 08:58:11.821389 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 08:58:11.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:11.821535 systemd[1]: Stopped initrd-setup-root.service. Jul 2 08:58:11.826479 systemd[1]: Starting initrd-switch-root.service... Jul 2 08:58:11.873662 systemd[1]: Switching root. Jul 2 08:58:11.902995 iscsid[638]: iscsid shutting down. Jul 2 08:58:11.904329 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Jul 2 08:58:11.904444 systemd-journald[184]: Journal stopped Jul 2 08:58:19.897171 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 08:58:19.897243 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 08:58:19.897258 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 08:58:19.897270 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 08:58:19.897281 kernel: SELinux: policy capability open_perms=1 Jul 2 08:58:19.897293 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 08:58:19.897307 kernel: SELinux: policy capability always_check_network=0 Jul 2 08:58:19.897319 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 08:58:19.897331 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 08:58:19.897347 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 08:58:19.897359 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 08:58:19.897372 systemd[1]: Successfully loaded SELinux policy in 92.597ms. Jul 2 08:58:19.897396 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.003ms. Jul 2 08:58:19.897415 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 08:58:19.897429 systemd[1]: Detected virtualization kvm. Jul 2 08:58:19.897443 systemd[1]: Detected architecture x86-64. Jul 2 08:58:19.897455 systemd[1]: Detected first boot. Jul 2 08:58:19.897467 systemd[1]: Hostname set to . Jul 2 08:58:19.897480 systemd[1]: Initializing machine ID from VM UUID. Jul 2 08:58:19.897492 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 08:58:19.897504 systemd[1]: Populated /etc with preset unit settings. Jul 2 08:58:19.897517 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:58:19.897534 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:58:19.897548 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:58:19.897562 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 08:58:19.897573 kernel: audit: type=1334 audit(1719910699.405:88): prog-id=12 op=LOAD Jul 2 08:58:19.897585 kernel: audit: type=1334 audit(1719910699.405:89): prog-id=3 op=UNLOAD Jul 2 08:58:19.897597 kernel: audit: type=1334 audit(1719910699.405:90): prog-id=13 op=LOAD Jul 2 08:58:19.897609 kernel: audit: type=1334 audit(1719910699.407:91): prog-id=14 op=LOAD Jul 2 08:58:19.897622 kernel: audit: type=1334 audit(1719910699.407:92): prog-id=4 op=UNLOAD Jul 2 08:58:19.897634 kernel: audit: type=1334 audit(1719910699.407:93): prog-id=5 op=UNLOAD Jul 2 08:58:19.897645 kernel: audit: type=1334 audit(1719910699.410:94): prog-id=15 op=LOAD Jul 2 08:58:19.897656 kernel: audit: type=1334 audit(1719910699.410:95): prog-id=12 op=UNLOAD Jul 2 08:58:19.897668 kernel: audit: type=1334 audit(1719910699.416:96): prog-id=16 op=LOAD Jul 2 08:58:19.897680 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 08:58:19.897692 kernel: audit: type=1334 audit(1719910699.422:97): prog-id=17 op=LOAD Jul 2 08:58:19.897704 systemd[1]: Stopped iscsid.service. Jul 2 08:58:19.897719 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 08:58:19.897737 systemd[1]: Stopped initrd-switch-root.service. Jul 2 08:58:19.897749 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 08:58:19.897762 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 08:58:19.897775 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 08:58:19.897788 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 08:58:19.897833 systemd[1]: Created slice system-getty.slice. Jul 2 08:58:19.897851 systemd[1]: Created slice system-modprobe.slice. Jul 2 08:58:19.897864 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 08:58:19.897876 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 08:58:19.897889 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 08:58:19.897901 systemd[1]: Created slice user.slice. Jul 2 08:58:19.897915 systemd[1]: Started systemd-ask-password-console.path. Jul 2 08:58:19.897927 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 08:58:19.897939 systemd[1]: Set up automount boot.automount. Jul 2 08:58:19.897951 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 08:58:19.897963 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 08:58:19.897975 systemd[1]: Stopped target initrd-fs.target. Jul 2 08:58:19.897987 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 08:58:19.897999 systemd[1]: Reached target integritysetup.target. Jul 2 08:58:19.898011 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 08:58:19.898026 systemd[1]: Reached target remote-fs.target. Jul 2 08:58:19.898038 systemd[1]: Reached target slices.target. Jul 2 08:58:19.898050 systemd[1]: Reached target swap.target. Jul 2 08:58:19.898062 systemd[1]: Reached target torcx.target. Jul 2 08:58:19.898074 systemd[1]: Reached target veritysetup.target. Jul 2 08:58:19.898086 systemd[1]: Listening on systemd-coredump.socket. Jul 2 08:58:19.898098 systemd[1]: Listening on systemd-initctl.socket. Jul 2 08:58:19.898110 systemd[1]: Listening on systemd-networkd.socket. Jul 2 08:58:19.898123 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 08:58:19.898135 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 08:58:19.898149 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 08:58:19.898162 systemd[1]: Mounting dev-hugepages.mount... Jul 2 08:58:19.898173 systemd[1]: Mounting dev-mqueue.mount... Jul 2 08:58:19.898185 systemd[1]: Mounting media.mount... Jul 2 08:58:19.898198 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:19.898210 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 08:58:19.898222 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 08:58:19.898234 systemd[1]: Mounting tmp.mount... Jul 2 08:58:19.898246 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 08:58:19.898261 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:58:19.898273 systemd[1]: Starting kmod-static-nodes.service... Jul 2 08:58:19.898285 systemd[1]: Starting modprobe@configfs.service... Jul 2 08:58:19.898296 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:58:19.898309 systemd[1]: Starting modprobe@drm.service... Jul 2 08:58:19.898321 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:58:19.898333 systemd[1]: Starting modprobe@fuse.service... Jul 2 08:58:19.898345 systemd[1]: Starting modprobe@loop.service... Jul 2 08:58:19.898357 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 08:58:19.898372 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 08:58:19.898385 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 08:58:19.898397 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 08:58:19.898410 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 08:58:19.898422 systemd[1]: Stopped systemd-journald.service. Jul 2 08:58:19.898434 systemd[1]: Starting systemd-journald.service... Jul 2 08:58:19.898446 systemd[1]: Starting systemd-modules-load.service... Jul 2 08:58:19.898457 systemd[1]: Starting systemd-network-generator.service... Jul 2 08:58:19.898469 systemd[1]: Starting systemd-remount-fs.service... Jul 2 08:58:19.898483 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 08:58:19.898496 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 08:58:19.898508 systemd[1]: Stopped verity-setup.service. Jul 2 08:58:19.898520 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:19.898532 systemd[1]: Mounted dev-hugepages.mount. Jul 2 08:58:19.898544 systemd[1]: Mounted dev-mqueue.mount. Jul 2 08:58:19.898555 systemd[1]: Mounted media.mount. Jul 2 08:58:19.898568 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 08:58:19.898580 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 08:58:19.898594 systemd[1]: Mounted tmp.mount. Jul 2 08:58:19.898606 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:58:19.898618 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:58:19.898630 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 08:58:19.898642 systemd[1]: Finished modprobe@drm.service. Jul 2 08:58:19.898656 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:58:19.898668 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:58:19.898680 systemd[1]: Finished systemd-network-generator.service. Jul 2 08:58:19.898692 systemd[1]: Finished systemd-remount-fs.service. Jul 2 08:58:19.898704 systemd[1]: Reached target network-pre.target. Jul 2 08:58:19.898717 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 08:58:19.898733 systemd-journald[909]: Journal started Jul 2 08:58:19.898779 systemd-journald[909]: Runtime Journal (/run/log/journal/23e8f2835b3246fea3d7dae8619027b0) is 4.9M, max 39.5M, 34.5M free. Jul 2 08:58:12.262000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 08:58:12.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 08:58:12.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 08:58:12.403000 audit: BPF prog-id=10 op=LOAD Jul 2 08:58:12.403000 audit: BPF prog-id=10 op=UNLOAD Jul 2 08:58:12.403000 audit: BPF prog-id=11 op=LOAD Jul 2 08:58:12.403000 audit: BPF prog-id=11 op=UNLOAD Jul 2 08:58:12.571000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 08:58:12.571000 audit[847]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:12.571000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:58:12.574000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 08:58:12.574000 audit[847]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:12.574000 audit: CWD cwd="/" Jul 2 08:58:12.574000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:12.574000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:12.574000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 08:58:19.405000 audit: BPF prog-id=12 op=LOAD Jul 2 08:58:19.405000 audit: BPF prog-id=3 op=UNLOAD Jul 2 08:58:19.405000 audit: BPF prog-id=13 op=LOAD Jul 2 08:58:19.407000 audit: BPF prog-id=14 op=LOAD Jul 2 08:58:19.407000 audit: BPF prog-id=4 op=UNLOAD Jul 2 08:58:19.407000 audit: BPF prog-id=5 op=UNLOAD Jul 2 08:58:19.410000 audit: BPF prog-id=15 op=LOAD Jul 2 08:58:19.410000 audit: BPF prog-id=12 op=UNLOAD Jul 2 08:58:19.416000 audit: BPF prog-id=16 op=LOAD Jul 2 08:58:19.422000 audit: BPF prog-id=17 op=LOAD Jul 2 08:58:19.422000 audit: BPF prog-id=13 op=UNLOAD Jul 2 08:58:19.422000 audit: BPF prog-id=14 op=UNLOAD Jul 2 08:58:19.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.440000 audit: BPF prog-id=15 op=UNLOAD Jul 2 08:58:19.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.653000 audit: BPF prog-id=18 op=LOAD Jul 2 08:58:19.653000 audit: BPF prog-id=19 op=LOAD Jul 2 08:58:19.653000 audit: BPF prog-id=20 op=LOAD Jul 2 08:58:19.653000 audit: BPF prog-id=16 op=UNLOAD Jul 2 08:58:19.653000 audit: BPF prog-id=17 op=UNLOAD Jul 2 08:58:19.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.895000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 08:58:19.895000 audit[909]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff990fcaf0 a2=4000 a3=7fff990fcb8c items=0 ppid=1 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:19.895000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 08:58:12.567834 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:58:19.403856 systemd[1]: Queued start job for default target multi-user.target. Jul 2 08:58:12.568870 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 08:58:19.403872 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 08:58:12.568896 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 08:58:19.423981 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 08:58:12.568941 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 08:58:12.568954 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 08:58:12.568995 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 08:58:12.569012 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 08:58:12.569284 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 08:58:12.569334 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 08:58:12.569351 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 08:58:12.571566 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 08:58:12.571611 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 08:58:12.571636 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 08:58:12.571655 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 08:58:12.571678 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 08:58:12.571695 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 08:58:17.145229 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:58:17.145605 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:58:17.145743 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:58:17.145996 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 08:58:17.146065 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 08:58:17.146141 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-07-02T08:58:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 08:58:19.928316 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 08:58:19.928394 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:58:19.931849 systemd[1]: Starting systemd-random-seed.service... Jul 2 08:58:19.935043 systemd[1]: Started systemd-journald.service. Jul 2 08:58:19.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.935631 systemd[1]: Finished kmod-static-nodes.service. Jul 2 08:58:19.937993 systemd[1]: Starting systemd-journal-flush.service... Jul 2 08:58:19.948036 kernel: loop: module loaded Jul 2 08:58:19.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.942678 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:58:19.942878 systemd[1]: Finished modprobe@loop.service. Jul 2 08:58:19.943607 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:58:19.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.955647 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 08:58:19.955790 systemd[1]: Finished modprobe@configfs.service. Jul 2 08:58:19.957722 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 08:58:19.965845 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 08:58:19.971754 systemd-journald[909]: Time spent on flushing to /var/log/journal/23e8f2835b3246fea3d7dae8619027b0 is 33.245ms for 1076 entries. Jul 2 08:58:19.971754 systemd-journald[909]: System Journal (/var/log/journal/23e8f2835b3246fea3d7dae8619027b0) is 8.0M, max 584.8M, 576.8M free. Jul 2 08:58:20.054106 systemd-journald[909]: Received client request to flush runtime journal. Jul 2 08:58:20.054152 kernel: fuse: init (API version 7.34) Jul 2 08:58:19.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:20.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:20.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:19.983655 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 08:58:19.984351 systemd[1]: Finished modprobe@fuse.service. Jul 2 08:58:19.987008 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 08:58:19.990701 systemd[1]: Finished systemd-modules-load.service. Jul 2 08:58:19.992476 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 08:58:19.994705 systemd[1]: Starting systemd-sysctl.service... Jul 2 08:58:20.008141 systemd[1]: Finished systemd-random-seed.service. Jul 2 08:58:20.008850 systemd[1]: Reached target first-boot-complete.target. Jul 2 08:58:20.046398 systemd[1]: Finished systemd-sysctl.service. Jul 2 08:58:20.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:20.064486 systemd[1]: Finished systemd-journal-flush.service. Jul 2 08:58:20.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:20.085644 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 08:58:20.087795 systemd[1]: Starting systemd-sysusers.service... Jul 2 08:58:20.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:20.096721 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 08:58:20.098842 systemd[1]: Starting systemd-udev-settle.service... Jul 2 08:58:20.122186 udevadm[960]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 08:58:20.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:20.556549 systemd[1]: Finished systemd-sysusers.service. Jul 2 08:58:21.189759 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 08:58:21.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.191000 audit: BPF prog-id=21 op=LOAD Jul 2 08:58:21.192000 audit: BPF prog-id=22 op=LOAD Jul 2 08:58:21.192000 audit: BPF prog-id=7 op=UNLOAD Jul 2 08:58:21.192000 audit: BPF prog-id=8 op=UNLOAD Jul 2 08:58:21.194351 systemd[1]: Starting systemd-udevd.service... Jul 2 08:58:21.242117 systemd-udevd[961]: Using default interface naming scheme 'v252'. Jul 2 08:58:21.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.298382 systemd[1]: Started systemd-udevd.service. Jul 2 08:58:21.313000 audit: BPF prog-id=23 op=LOAD Jul 2 08:58:21.316173 systemd[1]: Starting systemd-networkd.service... Jul 2 08:58:21.333000 audit: BPF prog-id=24 op=LOAD Jul 2 08:58:21.334000 audit: BPF prog-id=25 op=LOAD Jul 2 08:58:21.334000 audit: BPF prog-id=26 op=LOAD Jul 2 08:58:21.337137 systemd[1]: Starting systemd-userdbd.service... Jul 2 08:58:21.356493 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 08:58:21.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.411433 systemd[1]: Started systemd-userdbd.service. Jul 2 08:58:21.430416 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 08:58:21.447848 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 08:58:21.453846 kernel: ACPI: button: Power Button [PWRF] Jul 2 08:58:21.489000 audit[966]: AVC avc: denied { confidentiality } for pid=966 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 08:58:21.489000 audit[966]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563e69a0f720 a1=3207c a2=7f3ba2856bc5 a3=5 items=108 ppid=961 pid=966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:21.489000 audit: CWD cwd="/" Jul 2 08:58:21.489000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=1 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=2 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=3 name=(null) inode=14695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=4 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=5 name=(null) inode=14696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=6 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=7 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=8 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=9 name=(null) inode=14698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=10 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=11 name=(null) inode=14699 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=12 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=13 name=(null) inode=14700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=14 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=15 name=(null) inode=14701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=16 name=(null) inode=14697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=17 name=(null) inode=14702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=18 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=19 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=20 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=21 name=(null) inode=14704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=22 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=23 name=(null) inode=14705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=24 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=25 name=(null) inode=14706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=26 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=27 name=(null) inode=14707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=28 name=(null) inode=14703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=29 name=(null) inode=14708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=30 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=31 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=32 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=33 name=(null) inode=14710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=34 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=35 name=(null) inode=14711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=36 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=37 name=(null) inode=14712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=38 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=39 name=(null) inode=14713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=40 name=(null) inode=14709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=41 name=(null) inode=14714 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=42 name=(null) inode=14694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=43 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=44 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=45 name=(null) inode=14716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=46 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=47 name=(null) inode=14717 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=48 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=49 name=(null) inode=14718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=50 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=51 name=(null) inode=14719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=52 name=(null) inode=14715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=53 name=(null) inode=14720 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=55 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=56 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=57 name=(null) inode=14722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=58 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=59 name=(null) inode=14723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=60 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=61 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=62 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=63 name=(null) inode=14725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=64 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=65 name=(null) inode=14726 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=66 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=67 name=(null) inode=14727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=68 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=69 name=(null) inode=14728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=70 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=71 name=(null) inode=14729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=72 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=73 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=74 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=75 name=(null) inode=14731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=76 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=77 name=(null) inode=14732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=78 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=79 name=(null) inode=14733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=80 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=81 name=(null) inode=14734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=82 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=83 name=(null) inode=14735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=84 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=85 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=86 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=87 name=(null) inode=14737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=88 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=89 name=(null) inode=14738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=90 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=91 name=(null) inode=14739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=92 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=93 name=(null) inode=14740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=94 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=95 name=(null) inode=14741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=96 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=97 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=98 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=99 name=(null) inode=14743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=100 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=101 name=(null) inode=14744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=102 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=103 name=(null) inode=14745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=104 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=105 name=(null) inode=14746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=106 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PATH item=107 name=(null) inode=14747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:58:21.489000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 08:58:21.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.515146 systemd-networkd[977]: lo: Link UP Jul 2 08:58:21.515162 systemd-networkd[977]: lo: Gained carrier Jul 2 08:58:21.515627 systemd-networkd[977]: Enumeration completed Jul 2 08:58:21.515711 systemd[1]: Started systemd-networkd.service. Jul 2 08:58:21.517111 systemd-networkd[977]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 08:58:21.519326 systemd-networkd[977]: eth0: Link UP Jul 2 08:58:21.519336 systemd-networkd[977]: eth0: Gained carrier Jul 2 08:58:21.532897 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jul 2 08:58:21.533295 systemd-networkd[977]: eth0: DHCPv4 address 172.24.4.73/24, gateway 172.24.4.1 acquired from 172.24.4.1 Jul 2 08:58:21.538848 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 2 08:58:21.544848 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 08:58:21.592586 systemd[1]: Finished systemd-udev-settle.service. Jul 2 08:58:21.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.595580 systemd[1]: Starting lvm2-activation-early.service... Jul 2 08:58:21.633164 lvm[990]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 08:58:21.667298 systemd[1]: Finished lvm2-activation-early.service. Jul 2 08:58:21.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.668580 systemd[1]: Reached target cryptsetup.target. Jul 2 08:58:21.672000 systemd[1]: Starting lvm2-activation.service... Jul 2 08:58:21.676352 lvm[991]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 08:58:21.701279 systemd[1]: Finished lvm2-activation.service. Jul 2 08:58:21.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.702502 systemd[1]: Reached target local-fs-pre.target. Jul 2 08:58:21.703537 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 08:58:21.703597 systemd[1]: Reached target local-fs.target. Jul 2 08:58:21.704554 systemd[1]: Reached target machines.target. Jul 2 08:58:21.708437 systemd[1]: Starting ldconfig.service... Jul 2 08:58:21.714419 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:58:21.714526 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:58:21.717066 systemd[1]: Starting systemd-boot-update.service... Jul 2 08:58:21.720339 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 08:58:21.727081 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 08:58:21.731441 systemd[1]: Starting systemd-sysext.service... Jul 2 08:58:21.732337 systemd[1]: boot.automount: Got automount request for /boot, triggered by 993 (bootctl) Jul 2 08:58:21.734180 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 08:58:21.756383 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 08:58:21.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:21.780863 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 08:58:21.794199 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 08:58:21.794389 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 08:58:21.841866 kernel: loop0: detected capacity change from 0 to 211296 Jul 2 08:58:22.159124 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 08:58:22.160413 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 08:58:22.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.209908 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 08:58:22.248871 kernel: loop1: detected capacity change from 0 to 211296 Jul 2 08:58:22.305636 (sd-sysext)[1007]: Using extensions 'kubernetes'. Jul 2 08:58:22.310174 (sd-sysext)[1007]: Merged extensions into '/usr'. Jul 2 08:58:22.318862 systemd-fsck[1003]: fsck.fat 4.2 (2021-01-31) Jul 2 08:58:22.318862 systemd-fsck[1003]: /dev/vda1: 789 files, 119238/258078 clusters Jul 2 08:58:22.332367 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 08:58:22.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.343885 systemd[1]: Mounting boot.mount... Jul 2 08:58:22.364980 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.366677 systemd[1]: Mounting usr-share-oem.mount... Jul 2 08:58:22.371266 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.373126 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:58:22.374996 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:58:22.377990 systemd[1]: Starting modprobe@loop.service... Jul 2 08:58:22.378617 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.378759 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:58:22.378935 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.382057 systemd[1]: Mounted usr-share-oem.mount. Jul 2 08:58:22.385332 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:58:22.385481 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:58:22.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.386570 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:58:22.386709 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:58:22.387579 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:58:22.387683 systemd[1]: Finished modprobe@loop.service. Jul 2 08:58:22.388559 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:58:22.388696 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.390566 systemd[1]: Finished systemd-sysext.service. Jul 2 08:58:22.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.393231 systemd[1]: Starting ensure-sysext.service... Jul 2 08:58:22.399393 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 08:58:22.406319 systemd[1]: Mounted boot.mount. Jul 2 08:58:22.409693 systemd[1]: Reloading. Jul 2 08:58:22.441461 systemd-tmpfiles[1015]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 08:58:22.452036 systemd-tmpfiles[1015]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 08:58:22.469466 systemd-tmpfiles[1015]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 08:58:22.509326 /usr/lib/systemd/system-generators/torcx-generator[1037]: time="2024-07-02T08:58:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:58:22.511881 /usr/lib/systemd/system-generators/torcx-generator[1037]: time="2024-07-02T08:58:22Z" level=info msg="torcx already run" Jul 2 08:58:22.651333 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:58:22.651355 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:58:22.656094 systemd-networkd[977]: eth0: Gained IPv6LL Jul 2 08:58:22.680595 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:58:22.756000 audit: BPF prog-id=27 op=LOAD Jul 2 08:58:22.756000 audit: BPF prog-id=18 op=UNLOAD Jul 2 08:58:22.757000 audit: BPF prog-id=28 op=LOAD Jul 2 08:58:22.757000 audit: BPF prog-id=29 op=LOAD Jul 2 08:58:22.757000 audit: BPF prog-id=19 op=UNLOAD Jul 2 08:58:22.757000 audit: BPF prog-id=20 op=UNLOAD Jul 2 08:58:22.759000 audit: BPF prog-id=30 op=LOAD Jul 2 08:58:22.759000 audit: BPF prog-id=31 op=LOAD Jul 2 08:58:22.759000 audit: BPF prog-id=21 op=UNLOAD Jul 2 08:58:22.759000 audit: BPF prog-id=22 op=UNLOAD Jul 2 08:58:22.763000 audit: BPF prog-id=32 op=LOAD Jul 2 08:58:22.763000 audit: BPF prog-id=23 op=UNLOAD Jul 2 08:58:22.765000 audit: BPF prog-id=33 op=LOAD Jul 2 08:58:22.765000 audit: BPF prog-id=24 op=UNLOAD Jul 2 08:58:22.765000 audit: BPF prog-id=34 op=LOAD Jul 2 08:58:22.765000 audit: BPF prog-id=35 op=LOAD Jul 2 08:58:22.765000 audit: BPF prog-id=25 op=UNLOAD Jul 2 08:58:22.765000 audit: BPF prog-id=26 op=UNLOAD Jul 2 08:58:22.769635 systemd[1]: Finished systemd-boot-update.service. Jul 2 08:58:22.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.773699 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 08:58:22.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.782056 systemd[1]: Starting audit-rules.service... Jul 2 08:58:22.784186 systemd[1]: Starting clean-ca-certificates.service... Jul 2 08:58:22.786982 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 08:58:22.790000 audit: BPF prog-id=36 op=LOAD Jul 2 08:58:22.794000 audit: BPF prog-id=37 op=LOAD Jul 2 08:58:22.793997 systemd[1]: Starting systemd-resolved.service... Jul 2 08:58:22.798631 systemd[1]: Starting systemd-timesyncd.service... Jul 2 08:58:22.800530 systemd[1]: Starting systemd-update-utmp.service... Jul 2 08:58:22.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.801680 systemd[1]: Finished clean-ca-certificates.service. Jul 2 08:58:22.805227 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 08:58:22.813691 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.813979 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.816017 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:58:22.820553 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:58:22.822445 systemd[1]: Starting modprobe@loop.service... Jul 2 08:58:22.823036 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.823182 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:58:22.823310 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 08:58:22.823412 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.824489 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:58:22.824652 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:58:22.824000 audit[1088]: SYSTEM_BOOT pid=1088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.827351 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:58:22.827467 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:58:22.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.831459 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:58:22.831599 systemd[1]: Finished modprobe@loop.service. Jul 2 08:58:22.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.833466 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:58:22.833640 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.836701 systemd[1]: Finished systemd-update-utmp.service. Jul 2 08:58:22.839171 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.839387 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.840969 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:58:22.845425 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 08:58:22.849227 systemd[1]: Starting modprobe@loop.service... Jul 2 08:58:22.849782 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.850125 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:58:22.850268 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 08:58:22.850897 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.852535 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:58:22.853489 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:58:22.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.859902 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 08:58:22.860039 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 08:58:22.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.861347 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.861649 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.864446 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 08:58:22.866520 systemd[1]: Starting modprobe@drm.service... Jul 2 08:58:22.867481 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.867640 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:58:22.870747 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 08:58:22.871380 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 08:58:22.871567 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 08:58:22.871706 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 08:58:22.873055 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 08:58:22.873221 systemd[1]: Finished modprobe@loop.service. Jul 2 08:58:22.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.878374 systemd[1]: Finished ensure-sysext.service. Jul 2 08:58:22.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.883664 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 08:58:22.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.884952 ldconfig[992]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 08:58:22.885503 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 08:58:22.885643 systemd[1]: Finished modprobe@drm.service. Jul 2 08:58:22.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.887892 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 08:58:22.888038 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 08:58:22.888669 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.905050 systemd[1]: Finished ldconfig.service. Jul 2 08:58:22.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.912120 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 08:58:22.914204 systemd[1]: Starting systemd-update-done.service... Jul 2 08:58:22.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.926228 systemd[1]: Finished systemd-update-done.service. Jul 2 08:58:22.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:22.937000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 08:58:22.937000 audit[1112]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc2d233c50 a2=420 a3=0 items=0 ppid=1082 pid=1112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:22.937000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 08:58:22.938714 augenrules[1112]: No rules Jul 2 08:58:22.938853 systemd[1]: Finished audit-rules.service. Jul 2 08:58:22.954400 systemd-resolved[1085]: Positive Trust Anchors: Jul 2 08:58:22.954403 systemd[1]: Started systemd-timesyncd.service. Jul 2 08:58:22.954932 systemd-resolved[1085]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 08:58:22.955025 systemd-resolved[1085]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 08:58:22.955042 systemd[1]: Reached target time-set.target. Jul 2 08:58:22.963275 systemd-resolved[1085]: Using system hostname 'ci-3510-3-5-e-23fb10d09f.novalocal'. Jul 2 08:58:22.965033 systemd[1]: Started systemd-resolved.service. Jul 2 08:58:22.965631 systemd[1]: Reached target network.target. Jul 2 08:58:22.966129 systemd[1]: Reached target network-online.target. Jul 2 08:58:22.966654 systemd[1]: Reached target nss-lookup.target. Jul 2 08:58:22.967179 systemd[1]: Reached target sysinit.target. Jul 2 08:58:22.967782 systemd[1]: Started motdgen.path. Jul 2 08:58:22.968306 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 08:58:22.969193 systemd[1]: Started logrotate.timer. Jul 2 08:58:22.969739 systemd[1]: Started mdadm.timer. Jul 2 08:58:22.970190 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 08:58:22.970612 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 08:58:22.970644 systemd[1]: Reached target paths.target. Jul 2 08:58:22.971261 systemd[1]: Reached target timers.target. Jul 2 08:58:22.972032 systemd[1]: Listening on dbus.socket. Jul 2 08:58:22.973823 systemd[1]: Starting docker.socket... Jul 2 08:58:22.976947 systemd-timesyncd[1086]: Contacted time server 51.68.44.27:123 (0.flatcar.pool.ntp.org). Jul 2 08:58:22.977012 systemd-timesyncd[1086]: Initial clock synchronization to Tue 2024-07-02 08:58:23.344169 UTC. Jul 2 08:58:22.979400 systemd[1]: Listening on sshd.socket. Jul 2 08:58:22.980036 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:58:22.980604 systemd[1]: Listening on docker.socket. Jul 2 08:58:22.981165 systemd[1]: Reached target sockets.target. Jul 2 08:58:22.981612 systemd[1]: Reached target basic.target. Jul 2 08:58:22.982128 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.982164 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 08:58:22.983450 systemd[1]: Starting containerd.service... Jul 2 08:58:22.985193 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 08:58:22.987459 systemd[1]: Starting dbus.service... Jul 2 08:58:22.990629 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 08:58:22.998149 systemd[1]: Starting extend-filesystems.service... Jul 2 08:58:22.999606 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 08:58:23.004763 jq[1125]: false Jul 2 08:58:23.006383 systemd[1]: Starting kubelet.service... Jul 2 08:58:23.008332 systemd[1]: Starting motdgen.service... Jul 2 08:58:23.010992 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 08:58:23.014614 systemd[1]: Starting sshd-keygen.service... Jul 2 08:58:23.023715 systemd[1]: Starting systemd-logind.service... Jul 2 08:58:23.024983 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 08:58:23.025096 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 08:58:23.025986 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 08:58:23.027073 systemd[1]: Starting update-engine.service... Jul 2 08:58:23.029051 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 08:58:23.032783 jq[1136]: true Jul 2 08:58:23.033158 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 08:58:23.033392 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 08:58:23.035292 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 08:58:23.035500 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 08:58:23.054785 jq[1139]: true Jul 2 08:58:23.119211 extend-filesystems[1126]: Found loop1 Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda1 Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda2 Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda3 Jul 2 08:58:23.119211 extend-filesystems[1126]: Found usr Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda4 Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda6 Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda7 Jul 2 08:58:23.119211 extend-filesystems[1126]: Found vda9 Jul 2 08:58:23.119211 extend-filesystems[1126]: Checking size of /dev/vda9 Jul 2 08:58:23.124509 dbus-daemon[1122]: [system] SELinux support is enabled Jul 2 08:58:23.124750 systemd[1]: Started dbus.service. Jul 2 08:58:23.134448 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 08:58:23.134689 systemd[1]: Finished motdgen.service. Jul 2 08:58:23.135377 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 08:58:23.135408 systemd[1]: Reached target system-config.target. Jul 2 08:58:23.135970 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 08:58:23.135990 systemd[1]: Reached target user-config.target. Jul 2 08:58:23.163887 extend-filesystems[1126]: Resized partition /dev/vda9 Jul 2 08:58:23.183957 extend-filesystems[1174]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 08:58:23.246974 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Jul 2 08:58:23.247324 systemd-logind[1134]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 08:58:23.247348 systemd-logind[1134]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 08:58:23.248548 systemd-logind[1134]: New seat seat0. Jul 2 08:58:23.250346 bash[1171]: Updated "/home/core/.ssh/authorized_keys" Jul 2 08:58:23.251089 update_engine[1135]: I0702 08:58:23.249292 1135 main.cc:92] Flatcar Update Engine starting Jul 2 08:58:23.251352 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 08:58:23.254235 env[1140]: time="2024-07-02T08:58:23.253615483Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 08:58:23.256454 systemd[1]: Started systemd-logind.service. Jul 2 08:58:23.258284 systemd[1]: Started update-engine.service. Jul 2 08:58:23.261017 systemd[1]: Started locksmithd.service. Jul 2 08:58:23.262292 update_engine[1135]: I0702 08:58:23.262236 1135 update_check_scheduler.cc:74] Next update check in 7m8s Jul 2 08:58:23.326705 env[1140]: time="2024-07-02T08:58:23.326636135Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 08:58:23.327961 env[1140]: time="2024-07-02T08:58:23.327923621Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:58:23.332164 env[1140]: time="2024-07-02T08:58:23.332094881Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:58:23.332164 env[1140]: time="2024-07-02T08:58:23.332153971Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.332479358Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.332508594Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.332542629Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.332556838Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.332666311Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.332986385Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.333155125Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.333178346Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.333270842Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 08:58:23.334146 env[1140]: time="2024-07-02T08:58:23.333289830Z" level=info msg="metadata content store policy set" policy=shared Jul 2 08:58:23.404986 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477309501Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477393385Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477413934Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477582988Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477621435Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477642214Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477661736Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477680765Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477698443Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477718416Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477735097Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477751549Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.477983151Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 08:58:23.480318 env[1140]: time="2024-07-02T08:58:23.478117584Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 08:58:23.487760 extend-filesystems[1174]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 2 08:58:23.487760 extend-filesystems[1174]: old_desc_blocks = 1, new_desc_blocks = 3 Jul 2 08:58:23.487760 extend-filesystems[1174]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478400679Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478442625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478460481Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478514227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478532491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478550054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478565342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478580851Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478596727Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478610936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478624789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478641649Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478801827Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478824064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.503378 env[1140]: time="2024-07-02T08:58:23.478859011Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.481143 systemd[1]: Started containerd.service. Jul 2 08:58:23.504804 extend-filesystems[1126]: Resized filesystem in /dev/vda9 Jul 2 08:58:23.508017 env[1140]: time="2024-07-02T08:58:23.478875547Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 08:58:23.508017 env[1140]: time="2024-07-02T08:58:23.478899301Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 08:58:23.508017 env[1140]: time="2024-07-02T08:58:23.478916182Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 08:58:23.508017 env[1140]: time="2024-07-02T08:58:23.478936218Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 08:58:23.508017 env[1140]: time="2024-07-02T08:58:23.478987146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 08:58:23.490790 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 08:58:23.491345 systemd[1]: Finished extend-filesystems.service. Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.479224039Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.479298166Z" level=info msg="Connect containerd service" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.479336623Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480035862Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480350708Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480431646Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480489845Z" level=info msg="Start subscribing containerd event" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480532075Z" level=info msg="Start recovering state" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480605814Z" level=info msg="Start event monitor" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480628773Z" level=info msg="Start snapshots syncer" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480639640Z" level=info msg="Start cni network conf syncer for default" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480650674Z" level=info msg="Start streaming server" Jul 2 08:58:23.508404 env[1140]: time="2024-07-02T08:58:23.480885755Z" level=info msg="containerd successfully booted in 0.263860s" Jul 2 08:58:23.610764 sshd_keygen[1155]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 08:58:23.646694 systemd[1]: Finished sshd-keygen.service. Jul 2 08:58:23.649178 systemd[1]: Starting issuegen.service... Jul 2 08:58:23.656805 locksmithd[1179]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 08:58:23.657916 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 08:58:23.658119 systemd[1]: Finished issuegen.service. Jul 2 08:58:23.660644 systemd[1]: Starting systemd-user-sessions.service... Jul 2 08:58:23.670129 systemd[1]: Finished systemd-user-sessions.service. Jul 2 08:58:23.672739 systemd[1]: Started getty@tty1.service. Jul 2 08:58:23.675509 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 08:58:23.676387 systemd[1]: Reached target getty.target. Jul 2 08:58:25.243568 systemd[1]: Started kubelet.service. Jul 2 08:58:27.632255 kubelet[1202]: E0702 08:58:27.632160 1202 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:58:27.636798 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:58:27.637133 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:58:27.637597 systemd[1]: kubelet.service: Consumed 2.385s CPU time. Jul 2 08:58:30.144455 coreos-metadata[1121]: Jul 02 08:58:30.144 WARN failed to locate config-drive, using the metadata service API instead Jul 2 08:58:30.263439 coreos-metadata[1121]: Jul 02 08:58:30.263 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Jul 2 08:58:30.468394 coreos-metadata[1121]: Jul 02 08:58:30.468 INFO Fetch successful Jul 2 08:58:30.468765 coreos-metadata[1121]: Jul 02 08:58:30.468 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 2 08:58:30.485116 coreos-metadata[1121]: Jul 02 08:58:30.484 INFO Fetch successful Jul 2 08:58:30.499236 unknown[1121]: wrote ssh authorized keys file for user: core Jul 2 08:58:30.541231 update-ssh-keys[1211]: Updated "/home/core/.ssh/authorized_keys" Jul 2 08:58:30.542269 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 08:58:30.543183 systemd[1]: Reached target multi-user.target. Jul 2 08:58:30.545732 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 08:58:30.563797 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 08:58:30.564191 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 08:58:30.564976 systemd[1]: Startup finished in 950ms (kernel) + 7.428s (initrd) + 18.420s (userspace) = 26.799s. Jul 2 08:58:33.278306 systemd[1]: Created slice system-sshd.slice. Jul 2 08:58:33.280877 systemd[1]: Started sshd@0-172.24.4.73:22-172.24.4.1:59542.service. Jul 2 08:58:34.827353 sshd[1214]: Accepted publickey for core from 172.24.4.1 port 59542 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:58:34.897723 sshd[1214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:35.189551 systemd-logind[1134]: New session 1 of user core. Jul 2 08:58:35.193362 systemd[1]: Created slice user-500.slice. Jul 2 08:58:35.196043 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 08:58:35.240244 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 08:58:35.244580 systemd[1]: Starting user@500.service... Jul 2 08:58:35.343104 (systemd)[1217]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:35.573456 systemd[1217]: Queued start job for default target default.target. Jul 2 08:58:35.574340 systemd[1217]: Reached target paths.target. Jul 2 08:58:35.574369 systemd[1217]: Reached target sockets.target. Jul 2 08:58:35.574392 systemd[1217]: Reached target timers.target. Jul 2 08:58:35.574411 systemd[1217]: Reached target basic.target. Jul 2 08:58:35.574554 systemd[1]: Started user@500.service. Jul 2 08:58:35.576193 systemd[1]: Started session-1.scope. Jul 2 08:58:35.577028 systemd[1217]: Reached target default.target. Jul 2 08:58:35.577276 systemd[1217]: Startup finished in 220ms. Jul 2 08:58:35.967017 systemd[1]: Started sshd@1-172.24.4.73:22-172.24.4.1:40048.service. Jul 2 08:58:37.732956 sshd[1226]: Accepted publickey for core from 172.24.4.1 port 40048 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:58:37.738009 sshd[1226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:37.740501 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 08:58:37.741375 systemd[1]: Stopped kubelet.service. Jul 2 08:58:37.741489 systemd[1]: kubelet.service: Consumed 2.385s CPU time. Jul 2 08:58:37.745617 systemd[1]: Starting kubelet.service... Jul 2 08:58:37.755016 systemd-logind[1134]: New session 2 of user core. Jul 2 08:58:37.758573 systemd[1]: Started session-2.scope. Jul 2 08:58:37.885098 systemd[1]: Started kubelet.service. Jul 2 08:58:38.424146 kubelet[1233]: E0702 08:58:38.424039 1233 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:58:38.435627 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:58:38.436003 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:58:38.594461 sshd[1226]: pam_unix(sshd:session): session closed for user core Jul 2 08:58:38.601082 systemd[1]: Started sshd@2-172.24.4.73:22-172.24.4.1:40052.service. Jul 2 08:58:38.607761 systemd[1]: sshd@1-172.24.4.73:22-172.24.4.1:40048.service: Deactivated successfully. Jul 2 08:58:38.610220 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 08:58:38.614575 systemd-logind[1134]: Session 2 logged out. Waiting for processes to exit. Jul 2 08:58:38.619160 systemd-logind[1134]: Removed session 2. Jul 2 08:58:40.014770 sshd[1241]: Accepted publickey for core from 172.24.4.1 port 40052 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:58:40.018427 sshd[1241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:40.031896 systemd[1]: Started session-3.scope. Jul 2 08:58:40.035953 systemd-logind[1134]: New session 3 of user core. Jul 2 08:58:40.666778 sshd[1241]: pam_unix(sshd:session): session closed for user core Jul 2 08:58:40.674094 systemd[1]: Started sshd@3-172.24.4.73:22-172.24.4.1:40064.service. Jul 2 08:58:40.678783 systemd[1]: sshd@2-172.24.4.73:22-172.24.4.1:40052.service: Deactivated successfully. Jul 2 08:58:40.680921 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 08:58:40.683283 systemd-logind[1134]: Session 3 logged out. Waiting for processes to exit. Jul 2 08:58:40.685938 systemd-logind[1134]: Removed session 3. Jul 2 08:58:42.108632 sshd[1247]: Accepted publickey for core from 172.24.4.1 port 40064 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:58:42.113029 sshd[1247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:42.127451 systemd[1]: Started session-4.scope. Jul 2 08:58:42.129643 systemd-logind[1134]: New session 4 of user core. Jul 2 08:58:42.762208 sshd[1247]: pam_unix(sshd:session): session closed for user core Jul 2 08:58:42.770452 systemd[1]: Started sshd@4-172.24.4.73:22-172.24.4.1:40072.service. Jul 2 08:58:42.771755 systemd[1]: sshd@3-172.24.4.73:22-172.24.4.1:40064.service: Deactivated successfully. Jul 2 08:58:42.773412 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 08:58:42.778417 systemd-logind[1134]: Session 4 logged out. Waiting for processes to exit. Jul 2 08:58:42.781767 systemd-logind[1134]: Removed session 4. Jul 2 08:58:44.280474 sshd[1253]: Accepted publickey for core from 172.24.4.1 port 40072 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:58:44.285011 sshd[1253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:44.296355 systemd-logind[1134]: New session 5 of user core. Jul 2 08:58:44.297415 systemd[1]: Started session-5.scope. Jul 2 08:58:44.658018 sudo[1257]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 08:58:44.659673 sudo[1257]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:58:44.671164 dbus-daemon[1122]: \xd0M\xbfN\xf5U: received setenforce notice (enforcing=-1115212128) Jul 2 08:58:44.677220 sudo[1257]: pam_unix(sudo:session): session closed for user root Jul 2 08:58:44.879701 sshd[1253]: pam_unix(sshd:session): session closed for user core Jul 2 08:58:44.888271 systemd[1]: Started sshd@5-172.24.4.73:22-172.24.4.1:41796.service. Jul 2 08:58:44.892923 systemd[1]: sshd@4-172.24.4.73:22-172.24.4.1:40072.service: Deactivated successfully. Jul 2 08:58:44.894501 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 08:58:44.897610 systemd-logind[1134]: Session 5 logged out. Waiting for processes to exit. Jul 2 08:58:44.901020 systemd-logind[1134]: Removed session 5. Jul 2 08:58:46.234847 sshd[1260]: Accepted publickey for core from 172.24.4.1 port 41796 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:58:46.239908 sshd[1260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:46.252995 systemd-logind[1134]: New session 6 of user core. Jul 2 08:58:46.254550 systemd[1]: Started session-6.scope. Jul 2 08:58:46.648841 sudo[1265]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 08:58:46.649450 sudo[1265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:58:46.656901 sudo[1265]: pam_unix(sudo:session): session closed for user root Jul 2 08:58:46.667718 sudo[1264]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 08:58:46.669001 sudo[1264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:58:46.692289 systemd[1]: Stopping audit-rules.service... Jul 2 08:58:46.693000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 08:58:46.696574 kernel: kauditd_printk_skb: 229 callbacks suppressed Jul 2 08:58:46.696700 kernel: audit: type=1305 audit(1719910726.693:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 08:58:46.697348 auditctl[1268]: No rules Jul 2 08:58:46.698592 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 08:58:46.699002 systemd[1]: Stopped audit-rules.service. Jul 2 08:58:46.693000 audit[1268]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff24282380 a2=420 a3=0 items=0 ppid=1 pid=1268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:46.703369 systemd[1]: Starting audit-rules.service... Jul 2 08:58:46.713890 kernel: audit: type=1300 audit(1719910726.693:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff24282380 a2=420 a3=0 items=0 ppid=1 pid=1268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:46.693000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 08:58:46.727238 kernel: audit: type=1327 audit(1719910726.693:212): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 08:58:46.727398 kernel: audit: type=1131 audit(1719910726.696:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:46.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:46.757625 augenrules[1285]: No rules Jul 2 08:58:46.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:46.761180 sudo[1264]: pam_unix(sudo:session): session closed for user root Jul 2 08:58:46.758955 systemd[1]: Finished audit-rules.service. Jul 2 08:58:46.768912 kernel: audit: type=1130 audit(1719910726.758:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:46.760000 audit[1264]: USER_END pid=1264 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:58:46.778904 kernel: audit: type=1106 audit(1719910726.760:215): pid=1264 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:58:46.779008 kernel: audit: type=1104 audit(1719910726.760:216): pid=1264 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:58:46.760000 audit[1264]: CRED_DISP pid=1264 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:58:47.062100 sshd[1260]: pam_unix(sshd:session): session closed for user core Jul 2 08:58:47.063000 audit[1260]: USER_END pid=1260 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:47.077124 systemd[1]: Started sshd@6-172.24.4.73:22-172.24.4.1:41808.service. Jul 2 08:58:47.082881 kernel: audit: type=1106 audit(1719910727.063:217): pid=1260 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:47.063000 audit[1260]: CRED_DISP pid=1260 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:47.085580 systemd[1]: sshd@5-172.24.4.73:22-172.24.4.1:41796.service: Deactivated successfully. Jul 2 08:58:47.087170 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 08:58:47.094883 kernel: audit: type=1104 audit(1719910727.063:218): pid=1260 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:47.095076 systemd-logind[1134]: Session 6 logged out. Waiting for processes to exit. Jul 2 08:58:47.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.73:22-172.24.4.1:41808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:47.107902 kernel: audit: type=1130 audit(1719910727.076:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.73:22-172.24.4.1:41808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:47.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.73:22-172.24.4.1:41796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:47.108975 systemd-logind[1134]: Removed session 6. Jul 2 08:58:48.313000 audit[1290]: USER_ACCT pid=1290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:48.315025 sshd[1290]: Accepted publickey for core from 172.24.4.1 port 41808 ssh2: RSA SHA256:VdsmefeXTJb2AXrBK1NRbWKUCaaQF5AjdY0e7XHYE0Q Jul 2 08:58:48.316000 audit[1290]: CRED_ACQ pid=1290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:48.316000 audit[1290]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd83156900 a2=3 a3=0 items=0 ppid=1 pid=1290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:58:48.316000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 08:58:48.318388 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 08:58:48.330167 systemd-logind[1134]: New session 7 of user core. Jul 2 08:58:48.330681 systemd[1]: Started session-7.scope. Jul 2 08:58:48.342000 audit[1290]: USER_START pid=1290 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:48.346000 audit[1293]: CRED_ACQ pid=1293 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:58:48.656000 audit[1294]: USER_ACCT pid=1294 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:58:48.658880 sudo[1294]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 08:58:48.658000 audit[1294]: CRED_REFR pid=1294 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:58:48.660535 sudo[1294]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 08:58:48.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:48.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:48.662123 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 08:58:48.662659 systemd[1]: Stopped kubelet.service. Jul 2 08:58:48.664000 audit[1294]: USER_START pid=1294 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:58:48.666184 systemd[1]: Starting kubelet.service... Jul 2 08:58:48.704968 systemd[1]: Starting coreos-metadata.service... Jul 2 08:58:49.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:49.033556 systemd[1]: Started kubelet.service. Jul 2 08:58:49.276796 kubelet[1305]: E0702 08:58:49.276739 1305 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 08:58:49.279147 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 08:58:49.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 08:58:49.279274 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 08:58:55.778301 coreos-metadata[1300]: Jul 02 08:58:55.778 WARN failed to locate config-drive, using the metadata service API instead Jul 2 08:58:55.833239 coreos-metadata[1300]: Jul 02 08:58:55.833 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 2 08:58:56.334614 coreos-metadata[1300]: Jul 02 08:58:56.334 INFO Fetch successful Jul 2 08:58:56.334614 coreos-metadata[1300]: Jul 02 08:58:56.334 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Jul 2 08:58:56.347646 coreos-metadata[1300]: Jul 02 08:58:56.347 INFO Fetch successful Jul 2 08:58:56.347646 coreos-metadata[1300]: Jul 02 08:58:56.347 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Jul 2 08:58:56.363264 coreos-metadata[1300]: Jul 02 08:58:56.363 INFO Fetch successful Jul 2 08:58:56.363264 coreos-metadata[1300]: Jul 02 08:58:56.363 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Jul 2 08:58:56.383489 coreos-metadata[1300]: Jul 02 08:58:56.383 INFO Fetch successful Jul 2 08:58:56.383489 coreos-metadata[1300]: Jul 02 08:58:56.383 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Jul 2 08:58:56.402049 coreos-metadata[1300]: Jul 02 08:58:56.401 INFO Fetch successful Jul 2 08:58:56.421029 systemd[1]: Finished coreos-metadata.service. Jul 2 08:58:56.427761 kernel: kauditd_printk_skb: 15 callbacks suppressed Jul 2 08:58:56.427897 kernel: audit: type=1130 audit(1719910736.419:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:56.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:58.524855 systemd[1]: Stopped kubelet.service. Jul 2 08:58:58.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:58.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:58.536559 systemd[1]: Starting kubelet.service... Jul 2 08:58:58.544549 kernel: audit: type=1130 audit(1719910738.523:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:58.544713 kernel: audit: type=1131 audit(1719910738.523:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:58.579981 systemd[1]: Reloading. Jul 2 08:58:58.702313 /usr/lib/systemd/system-generators/torcx-generator[1370]: time="2024-07-02T08:58:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 08:58:58.702348 /usr/lib/systemd/system-generators/torcx-generator[1370]: time="2024-07-02T08:58:58Z" level=info msg="torcx already run" Jul 2 08:58:58.831687 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 08:58:58.831961 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 08:58:58.856191 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 08:58:58.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.947837 kernel: audit: type=1400 audit(1719910738.937:236): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.959187 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 08:58:58.959422 kernel: audit: type=1400 audit(1719910738.937:237): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.959499 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 08:58:58.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.968864 kernel: audit: backlog limit exceeded Jul 2 08:58:58.968981 kernel: audit: type=1400 audit(1719910738.938:238): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977867 kernel: audit: type=1400 audit(1719910738.938:239): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit: BPF prog-id=43 op=LOAD Jul 2 08:58:58.946000 audit: BPF prog-id=27 op=UNLOAD Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit: BPF prog-id=44 op=LOAD Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.946000 audit: BPF prog-id=45 op=LOAD Jul 2 08:58:58.946000 audit: BPF prog-id=28 op=UNLOAD Jul 2 08:58:58.946000 audit: BPF prog-id=29 op=UNLOAD Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit: BPF prog-id=46 op=LOAD Jul 2 08:58:58.948000 audit: BPF prog-id=38 op=UNLOAD Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit: BPF prog-id=47 op=LOAD Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.949000 audit: BPF prog-id=48 op=LOAD Jul 2 08:58:58.949000 audit: BPF prog-id=39 op=UNLOAD Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit: BPF prog-id=49 op=LOAD Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.978000 audit: BPF prog-id=51 op=LOAD Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit: BPF prog-id=52 op=LOAD Jul 2 08:58:58.981000 audit: BPF prog-id=36 op=UNLOAD Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.981000 audit: BPF prog-id=53 op=LOAD Jul 2 08:58:58.981000 audit: BPF prog-id=32 op=UNLOAD Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.982000 audit: BPF prog-id=54 op=LOAD Jul 2 08:58:58.982000 audit: BPF prog-id=33 op=UNLOAD Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit: BPF prog-id=55 op=LOAD Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit: BPF prog-id=56 op=LOAD Jul 2 08:58:58.983000 audit: BPF prog-id=34 op=UNLOAD Jul 2 08:58:58.983000 audit: BPF prog-id=35 op=UNLOAD Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:58:58.983000 audit: BPF prog-id=57 op=LOAD Jul 2 08:58:58.983000 audit: BPF prog-id=37 op=UNLOAD Jul 2 08:58:59.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:59.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:59.007124 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 08:58:59.007290 systemd[1]: Stopped kubelet.service. Jul 2 08:58:59.008978 systemd[1]: Starting kubelet.service... Jul 2 08:58:59.638585 systemd[1]: Started kubelet.service. Jul 2 08:58:59.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:58:59.806321 kubelet[1423]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:58:59.806321 kubelet[1423]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 08:58:59.806321 kubelet[1423]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 08:58:59.806321 kubelet[1423]: I0702 08:58:59.806301 1423 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 08:59:00.448777 kubelet[1423]: I0702 08:59:00.448740 1423 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 08:59:00.449004 kubelet[1423]: I0702 08:59:00.448993 1423 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 08:59:00.449316 kubelet[1423]: I0702 08:59:00.449302 1423 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 08:59:00.715605 kubelet[1423]: I0702 08:59:00.714951 1423 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 08:59:00.870460 kubelet[1423]: I0702 08:59:00.870418 1423 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 08:59:00.908400 kubelet[1423]: I0702 08:59:00.908362 1423 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 08:59:00.909006 kubelet[1423]: I0702 08:59:00.908975 1423 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 08:59:00.912849 kubelet[1423]: I0702 08:59:00.912788 1423 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 08:59:00.913015 kubelet[1423]: I0702 08:59:00.912995 1423 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 08:59:00.913288 kubelet[1423]: I0702 08:59:00.913267 1423 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:59:00.913607 kubelet[1423]: I0702 08:59:00.913585 1423 kubelet.go:396] "Attempting to sync node with API server" Jul 2 08:59:00.913745 kubelet[1423]: I0702 08:59:00.913727 1423 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 08:59:00.913933 kubelet[1423]: I0702 08:59:00.913913 1423 kubelet.go:312] "Adding apiserver pod source" Jul 2 08:59:00.914075 kubelet[1423]: I0702 08:59:00.914057 1423 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 08:59:00.914476 kubelet[1423]: E0702 08:59:00.914423 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:00.914568 kubelet[1423]: E0702 08:59:00.914513 1423 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:00.920249 kubelet[1423]: I0702 08:59:00.920224 1423 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 08:59:00.924586 kubelet[1423]: W0702 08:59:00.924520 1423 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "172.24.4.73" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 08:59:00.924696 kubelet[1423]: E0702 08:59:00.924591 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.73" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 08:59:00.924907 kubelet[1423]: W0702 08:59:00.924793 1423 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 08:59:00.924994 kubelet[1423]: E0702 08:59:00.924923 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 08:59:00.949002 kubelet[1423]: I0702 08:59:00.948956 1423 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 08:59:00.998626 kubelet[1423]: W0702 08:59:00.997089 1423 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 08:59:01.001232 kubelet[1423]: I0702 08:59:01.001183 1423 server.go:1256] "Started kubelet" Jul 2 08:59:01.004000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:01.004000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:59:01.004000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008d7ef0 a1=c000c1b6f8 a2=c0008d7ec0 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:59:01.004000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:01.004000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:59:01.004000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000147b40 a1=c000c1b710 a2=c0008d7f80 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:59:01.006216 kubelet[1423]: I0702 08:59:01.005090 1423 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 08:59:01.006216 kubelet[1423]: I0702 08:59:01.005188 1423 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 08:59:01.006216 kubelet[1423]: I0702 08:59:01.005341 1423 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 08:59:01.042511 kubelet[1423]: I0702 08:59:01.042421 1423 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 08:59:01.045189 kubelet[1423]: I0702 08:59:01.045137 1423 server.go:461] "Adding debug handlers to kubelet server" Jul 2 08:59:01.048116 kubelet[1423]: I0702 08:59:01.048071 1423 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 08:59:01.048783 kubelet[1423]: I0702 08:59:01.048746 1423 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 08:59:01.053865 kubelet[1423]: I0702 08:59:01.053746 1423 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 08:59:01.055450 kubelet[1423]: I0702 08:59:01.055407 1423 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 08:59:01.055764 kubelet[1423]: I0702 08:59:01.055737 1423 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 08:59:01.085520 kubelet[1423]: W0702 08:59:01.085426 1423 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 08:59:01.086047 kubelet[1423]: E0702 08:59:01.086015 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 08:59:01.098868 kubelet[1423]: E0702 08:59:01.095426 1423 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.73\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 2 08:59:01.103992 kubelet[1423]: I0702 08:59:01.103934 1423 factory.go:221] Registration of the systemd container factory successfully Jul 2 08:59:01.104218 kubelet[1423]: I0702 08:59:01.104155 1423 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 08:59:01.105614 kubelet[1423]: E0702 08:59:01.105522 1423 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 08:59:01.117452 kubelet[1423]: I0702 08:59:01.117377 1423 factory.go:221] Registration of the containerd container factory successfully Jul 2 08:59:01.128679 kubelet[1423]: E0702 08:59:01.128625 1423 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.73.17de59b4dab5bfd1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.73,UID:172.24.4.73,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.24.4.73,},FirstTimestamp:2024-07-02 08:59:01.000437713 +0000 UTC m=+1.349646001,LastTimestamp:2024-07-02 08:59:01.000437713 +0000 UTC m=+1.349646001,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.73,}" Jul 2 08:59:01.146497 kubelet[1423]: E0702 08:59:01.136974 1423 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.73.17de59b4e0f8babb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.73,UID:172.24.4.73,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.24.4.73,},FirstTimestamp:2024-07-02 08:59:01.105490619 +0000 UTC m=+1.454698907,LastTimestamp:2024-07-02 08:59:01.105490619 +0000 UTC m=+1.454698907,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.73,}" Jul 2 08:59:01.146497 kubelet[1423]: I0702 08:59:01.146041 1423 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 08:59:01.146497 kubelet[1423]: I0702 08:59:01.146058 1423 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 08:59:01.146497 kubelet[1423]: I0702 08:59:01.146098 1423 state_mem.go:36] "Initialized new in-memory state store" Jul 2 08:59:01.151073 kubelet[1423]: I0702 08:59:01.151055 1423 policy_none.go:49] "None policy: Start" Jul 2 08:59:01.151968 kubelet[1423]: I0702 08:59:01.151950 1423 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 08:59:01.152070 kubelet[1423]: I0702 08:59:01.152059 1423 state_mem.go:35] "Initializing new in-memory state store" Jul 2 08:59:01.162896 kubelet[1423]: I0702 08:59:01.162878 1423 kubelet_node_status.go:73] "Attempting to register node" node="172.24.4.73" Jul 2 08:59:01.168262 systemd[1]: Created slice kubepods.slice. Jul 2 08:59:01.173671 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 08:59:01.177524 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 08:59:01.180036 kubelet[1423]: I0702 08:59:01.180016 1423 kubelet_node_status.go:76] "Successfully registered node" node="172.24.4.73" Jul 2 08:59:01.185000 audit[1435]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.185000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5d4d42c0 a2=0 a3=7ffd5d4d42ac items=0 ppid=1423 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 08:59:01.187000 audit[1441]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.187000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd79726760 a2=0 a3=7ffd7972674c items=0 ppid=1423 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 08:59:01.191456 kubelet[1423]: I0702 08:59:01.191434 1423 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 08:59:01.189000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:01.189000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 08:59:01.189000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008d60c0 a1=c000dafad0 a2=c0008d6090 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.189000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 08:59:01.192020 kubelet[1423]: I0702 08:59:01.192005 1423 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 08:59:01.192285 kubelet[1423]: I0702 08:59:01.192269 1423 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 08:59:01.197690 kubelet[1423]: E0702 08:59:01.197658 1423 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.73\" not found" Jul 2 08:59:01.207760 kubelet[1423]: E0702 08:59:01.207725 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.73\" not found" Jul 2 08:59:01.190000 audit[1443]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.190000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff1258b370 a2=0 a3=7fff1258b35c items=0 ppid=1423 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:59:01.212000 audit[1448]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.212000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffee18fbb10 a2=0 a3=7ffee18fbafc items=0 ppid=1423 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:59:01.286000 audit[1453]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.286000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe24703510 a2=0 a3=7ffe247034fc items=0 ppid=1423 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 08:59:01.291567 kubelet[1423]: I0702 08:59:01.291471 1423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 08:59:01.293000 audit[1454]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:01.293000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed6ebfa80 a2=0 a3=7ffed6ebfa6c items=0 ppid=1423 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 08:59:01.293000 audit[1455]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.293000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff69a4ad00 a2=0 a3=7fff69a4acec items=0 ppid=1423 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 08:59:01.295291 kubelet[1423]: I0702 08:59:01.295228 1423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 08:59:01.295405 kubelet[1423]: I0702 08:59:01.295324 1423 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 08:59:01.295405 kubelet[1423]: I0702 08:59:01.295371 1423 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 08:59:01.295686 kubelet[1423]: E0702 08:59:01.295637 1423 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 08:59:01.297000 audit[1456]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:01.297000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5b27f3c0 a2=0 a3=7ffd5b27f3ac items=0 ppid=1423 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 08:59:01.299000 audit[1458]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:01.299000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc24e0f440 a2=0 a3=7ffc24e0f42c items=0 ppid=1423 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 08:59:01.301000 audit[1459]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.301000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe82000930 a2=0 a3=7ffe8200091c items=0 ppid=1423 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 08:59:01.301000 audit[1460]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:01.301000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4aab49e0 a2=0 a3=7ffc4aab49cc items=0 ppid=1423 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 08:59:01.303000 audit[1461]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:01.303000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf107b430 a2=0 a3=7ffdf107b41c items=0 ppid=1423 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:01.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 08:59:01.308326 kubelet[1423]: E0702 08:59:01.308282 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.73\" not found" Jul 2 08:59:01.408725 kubelet[1423]: E0702 08:59:01.408591 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.73\" not found" Jul 2 08:59:01.452107 kubelet[1423]: I0702 08:59:01.451985 1423 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 08:59:01.452785 kubelet[1423]: W0702 08:59:01.452622 1423 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Jul 2 08:59:01.509593 kubelet[1423]: E0702 08:59:01.509525 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.73\" not found" Jul 2 08:59:01.610607 kubelet[1423]: E0702 08:59:01.610458 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.73\" not found" Jul 2 08:59:01.712080 kubelet[1423]: E0702 08:59:01.712020 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.73\" not found" Jul 2 08:59:01.813582 kubelet[1423]: I0702 08:59:01.813546 1423 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 08:59:01.814746 env[1140]: time="2024-07-02T08:59:01.814606256Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 08:59:01.815798 kubelet[1423]: I0702 08:59:01.815766 1423 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 08:59:01.915262 kubelet[1423]: I0702 08:59:01.915071 1423 apiserver.go:52] "Watching apiserver" Jul 2 08:59:01.916282 kubelet[1423]: E0702 08:59:01.916108 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:01.927625 kubelet[1423]: I0702 08:59:01.927546 1423 topology_manager.go:215] "Topology Admit Handler" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" podNamespace="calico-system" podName="csi-node-driver-27bnv" Jul 2 08:59:01.927978 kubelet[1423]: I0702 08:59:01.927906 1423 topology_manager.go:215] "Topology Admit Handler" podUID="ad07cb0e-00cd-4be7-af4d-0af645bc7bc9" podNamespace="kube-system" podName="kube-proxy-wpg6h" Jul 2 08:59:01.928189 kubelet[1423]: I0702 08:59:01.928110 1423 topology_manager.go:215] "Topology Admit Handler" podUID="19185b49-1b40-4104-a556-dd829e95a38a" podNamespace="calico-system" podName="calico-node-mfpx7" Jul 2 08:59:01.928607 kubelet[1423]: E0702 08:59:01.928562 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:01.940927 systemd[1]: Created slice kubepods-besteffort-podad07cb0e_00cd_4be7_af4d_0af645bc7bc9.slice. Jul 2 08:59:01.957304 kubelet[1423]: I0702 08:59:01.957259 1423 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 08:59:01.967395 kubelet[1423]: I0702 08:59:01.966273 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f78wg\" (UniqueName: \"kubernetes.io/projected/19185b49-1b40-4104-a556-dd829e95a38a-kube-api-access-f78wg\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.967395 kubelet[1423]: I0702 08:59:01.966384 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9771cf57-545a-4bc6-9c54-0f209c12eec3-varrun\") pod \"csi-node-driver-27bnv\" (UID: \"9771cf57-545a-4bc6-9c54-0f209c12eec3\") " pod="calico-system/csi-node-driver-27bnv" Jul 2 08:59:01.967395 kubelet[1423]: I0702 08:59:01.966505 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9771cf57-545a-4bc6-9c54-0f209c12eec3-socket-dir\") pod \"csi-node-driver-27bnv\" (UID: \"9771cf57-545a-4bc6-9c54-0f209c12eec3\") " pod="calico-system/csi-node-driver-27bnv" Jul 2 08:59:01.967395 kubelet[1423]: I0702 08:59:01.966625 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ad07cb0e-00cd-4be7-af4d-0af645bc7bc9-kube-proxy\") pod \"kube-proxy-wpg6h\" (UID: \"ad07cb0e-00cd-4be7-af4d-0af645bc7bc9\") " pod="kube-system/kube-proxy-wpg6h" Jul 2 08:59:01.967395 kubelet[1423]: I0702 08:59:01.966727 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ad07cb0e-00cd-4be7-af4d-0af645bc7bc9-lib-modules\") pod \"kube-proxy-wpg6h\" (UID: \"ad07cb0e-00cd-4be7-af4d-0af645bc7bc9\") " pod="kube-system/kube-proxy-wpg6h" Jul 2 08:59:01.966910 systemd[1]: Created slice kubepods-besteffort-pod19185b49_1b40_4104_a556_dd829e95a38a.slice. Jul 2 08:59:01.968076 kubelet[1423]: I0702 08:59:01.967695 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-xtables-lock\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.968076 kubelet[1423]: I0702 08:59:01.967869 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/19185b49-1b40-4104-a556-dd829e95a38a-tigera-ca-bundle\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.968076 kubelet[1423]: I0702 08:59:01.967975 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-cni-net-dir\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.968283 kubelet[1423]: I0702 08:59:01.968092 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-lib-modules\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.968283 kubelet[1423]: I0702 08:59:01.968196 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/19185b49-1b40-4104-a556-dd829e95a38a-node-certs\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.968417 kubelet[1423]: I0702 08:59:01.968292 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-cni-bin-dir\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.968417 kubelet[1423]: I0702 08:59:01.968390 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9771cf57-545a-4bc6-9c54-0f209c12eec3-kubelet-dir\") pod \"csi-node-driver-27bnv\" (UID: \"9771cf57-545a-4bc6-9c54-0f209c12eec3\") " pod="calico-system/csi-node-driver-27bnv" Jul 2 08:59:01.968659 kubelet[1423]: I0702 08:59:01.968507 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9771cf57-545a-4bc6-9c54-0f209c12eec3-registration-dir\") pod \"csi-node-driver-27bnv\" (UID: \"9771cf57-545a-4bc6-9c54-0f209c12eec3\") " pod="calico-system/csi-node-driver-27bnv" Jul 2 08:59:01.968659 kubelet[1423]: I0702 08:59:01.968653 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ad07cb0e-00cd-4be7-af4d-0af645bc7bc9-xtables-lock\") pod \"kube-proxy-wpg6h\" (UID: \"ad07cb0e-00cd-4be7-af4d-0af645bc7bc9\") " pod="kube-system/kube-proxy-wpg6h" Jul 2 08:59:01.968875 kubelet[1423]: I0702 08:59:01.968750 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-policysync\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.968953 kubelet[1423]: I0702 08:59:01.968884 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-cni-log-dir\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.969032 kubelet[1423]: I0702 08:59:01.968990 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pd7fj\" (UniqueName: \"kubernetes.io/projected/ad07cb0e-00cd-4be7-af4d-0af645bc7bc9-kube-api-access-pd7fj\") pod \"kube-proxy-wpg6h\" (UID: \"ad07cb0e-00cd-4be7-af4d-0af645bc7bc9\") " pod="kube-system/kube-proxy-wpg6h" Jul 2 08:59:01.969172 kubelet[1423]: I0702 08:59:01.969093 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-var-run-calico\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.969288 kubelet[1423]: I0702 08:59:01.969247 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-var-lib-calico\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.969380 kubelet[1423]: I0702 08:59:01.969360 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/19185b49-1b40-4104-a556-dd829e95a38a-flexvol-driver-host\") pod \"calico-node-mfpx7\" (UID: \"19185b49-1b40-4104-a556-dd829e95a38a\") " pod="calico-system/calico-node-mfpx7" Jul 2 08:59:01.969498 kubelet[1423]: I0702 08:59:01.969460 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tj4w2\" (UniqueName: \"kubernetes.io/projected/9771cf57-545a-4bc6-9c54-0f209c12eec3-kube-api-access-tj4w2\") pod \"csi-node-driver-27bnv\" (UID: \"9771cf57-545a-4bc6-9c54-0f209c12eec3\") " pod="calico-system/csi-node-driver-27bnv" Jul 2 08:59:02.078662 kubelet[1423]: E0702 08:59:02.078605 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:59:02.079071 kubelet[1423]: W0702 08:59:02.079031 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:59:02.079309 kubelet[1423]: E0702 08:59:02.079267 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:59:02.094264 kubelet[1423]: E0702 08:59:02.094224 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:59:02.094578 kubelet[1423]: W0702 08:59:02.094540 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:59:02.097108 kubelet[1423]: E0702 08:59:02.097070 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:59:02.116763 kubelet[1423]: E0702 08:59:02.116712 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:59:02.124491 kubelet[1423]: W0702 08:59:02.124400 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:59:02.128437 kubelet[1423]: E0702 08:59:02.125197 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:59:02.133168 kubelet[1423]: E0702 08:59:02.133116 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:59:02.133168 kubelet[1423]: W0702 08:59:02.133161 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:59:02.133451 kubelet[1423]: E0702 08:59:02.133204 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:59:02.148677 kubelet[1423]: E0702 08:59:02.148637 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 08:59:02.149020 kubelet[1423]: W0702 08:59:02.148987 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 08:59:02.149220 kubelet[1423]: E0702 08:59:02.149193 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 08:59:02.246243 sudo[1294]: pam_unix(sudo:session): session closed for user root Jul 2 08:59:02.245000 audit[1294]: USER_END pid=1294 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:59:02.249060 kernel: kauditd_printk_skb: 244 callbacks suppressed Jul 2 08:59:02.249142 kernel: audit: type=1106 audit(1719910742.245:412): pid=1294 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:59:02.245000 audit[1294]: CRED_DISP pid=1294 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:59:02.270736 env[1140]: time="2024-07-02T08:59:02.270618417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wpg6h,Uid:ad07cb0e-00cd-4be7-af4d-0af645bc7bc9,Namespace:kube-system,Attempt:0,}" Jul 2 08:59:02.270983 kernel: audit: type=1104 audit(1719910742.245:413): pid=1294 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 08:59:02.280973 env[1140]: time="2024-07-02T08:59:02.280669693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mfpx7,Uid:19185b49-1b40-4104-a556-dd829e95a38a,Namespace:calico-system,Attempt:0,}" Jul 2 08:59:02.436779 sshd[1290]: pam_unix(sshd:session): session closed for user core Jul 2 08:59:02.438000 audit[1290]: USER_END pid=1290 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:59:02.443975 systemd[1]: sshd@6-172.24.4.73:22-172.24.4.1:41808.service: Deactivated successfully. Jul 2 08:59:02.445589 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 08:59:02.445916 systemd[1]: session-7.scope: Consumed 1.145s CPU time. Jul 2 08:59:02.452926 kernel: audit: type=1106 audit(1719910742.438:414): pid=1290 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:59:02.438000 audit[1290]: CRED_DISP pid=1290 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:59:02.463877 kernel: audit: type=1104 audit(1719910742.438:415): pid=1290 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Jul 2 08:59:02.463740 systemd-logind[1134]: Session 7 logged out. Waiting for processes to exit. Jul 2 08:59:02.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.73:22-172.24.4.1:41808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:59:02.474889 kernel: audit: type=1131 audit(1719910742.438:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.73:22-172.24.4.1:41808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 08:59:02.475952 systemd-logind[1134]: Removed session 7. Jul 2 08:59:02.917217 kubelet[1423]: E0702 08:59:02.917084 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:03.298381 kubelet[1423]: E0702 08:59:03.296037 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:03.531478 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1691993506.mount: Deactivated successfully. Jul 2 08:59:03.542890 env[1140]: time="2024-07-02T08:59:03.542722990Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.552559 env[1140]: time="2024-07-02T08:59:03.552054793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.555225 env[1140]: time="2024-07-02T08:59:03.555167370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.561987 env[1140]: time="2024-07-02T08:59:03.561904767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.566424 env[1140]: time="2024-07-02T08:59:03.566362301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.573004 env[1140]: time="2024-07-02T08:59:03.572950321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.577912 env[1140]: time="2024-07-02T08:59:03.577857312Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.584189 env[1140]: time="2024-07-02T08:59:03.584097703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:03.653255 env[1140]: time="2024-07-02T08:59:03.653119677Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:59:03.653475 env[1140]: time="2024-07-02T08:59:03.653212762Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:59:03.653475 env[1140]: time="2024-07-02T08:59:03.653232332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:59:03.653643 env[1140]: time="2024-07-02T08:59:03.653495086Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a pid=1488 runtime=io.containerd.runc.v2 Jul 2 08:59:03.659052 env[1140]: time="2024-07-02T08:59:03.658963796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:59:03.659165 env[1140]: time="2024-07-02T08:59:03.659035638Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:59:03.659165 env[1140]: time="2024-07-02T08:59:03.659120984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:59:03.659375 env[1140]: time="2024-07-02T08:59:03.659333701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c649998baa2dfb17ba4029c54eafc03746ed818bc76abba56d986b16de319746 pid=1490 runtime=io.containerd.runc.v2 Jul 2 08:59:03.675401 systemd[1]: Started cri-containerd-bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a.scope. Jul 2 08:59:03.687289 systemd[1]: Started cri-containerd-c649998baa2dfb17ba4029c54eafc03746ed818bc76abba56d986b16de319746.scope. Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712728 kernel: audit: type=1400 audit(1719910743.704:417): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712796 kernel: audit: type=1400 audit(1719910743.704:418): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.721546 kernel: audit: type=1400 audit(1719910743.704:419): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.721622 kernel: audit: type=1400 audit(1719910743.704:420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.728917 kernel: audit: type=1400 audit(1719910743.704:421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit: BPF prog-id=58 op=LOAD Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1488 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373634623961383431306638373064393937336335616161346437 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1488 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373634623961383431306638373064393937336335616161346437 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.704000 audit: BPF prog-id=59 op=LOAD Jul 2 08:59:03.704000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000260bf0 items=0 ppid=1488 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373634623961383431306638373064393937336335616161346437 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit: BPF prog-id=60 op=LOAD Jul 2 08:59:03.712000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000260c38 items=0 ppid=1488 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373634623961383431306638373064393937336335616161346437 Jul 2 08:59:03.712000 audit: BPF prog-id=60 op=UNLOAD Jul 2 08:59:03.712000 audit: BPF prog-id=59 op=UNLOAD Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.712000 audit: BPF prog-id=61 op=LOAD Jul 2 08:59:03.712000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000261048 items=0 ppid=1488 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373634623961383431306638373064393937336335616161346437 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.734000 audit: BPF prog-id=62 op=LOAD Jul 2 08:59:03.735000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.735000 audit[1508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1490 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343939393862616132646662313762613430323963353465616663 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1490 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343939393862616132646662313762613430323963353465616663 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit: BPF prog-id=63 op=LOAD Jul 2 08:59:03.738000 audit[1508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000372020 items=0 ppid=1490 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343939393862616132646662313762613430323963353465616663 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit: BPF prog-id=64 op=LOAD Jul 2 08:59:03.738000 audit[1508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000372068 items=0 ppid=1490 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343939393862616132646662313762613430323963353465616663 Jul 2 08:59:03.738000 audit: BPF prog-id=64 op=UNLOAD Jul 2 08:59:03.738000 audit: BPF prog-id=63 op=UNLOAD Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { perfmon } for pid=1508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit[1508]: AVC avc: denied { bpf } for pid=1508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:03.738000 audit: BPF prog-id=65 op=LOAD Jul 2 08:59:03.738000 audit[1508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000372478 items=0 ppid=1490 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:03.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343939393862616132646662313762613430323963353465616663 Jul 2 08:59:03.753041 env[1140]: time="2024-07-02T08:59:03.752664068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mfpx7,Uid:19185b49-1b40-4104-a556-dd829e95a38a,Namespace:calico-system,Attempt:0,} returns sandbox id \"bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a\"" Jul 2 08:59:03.755866 env[1140]: time="2024-07-02T08:59:03.755671027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 08:59:03.763135 env[1140]: time="2024-07-02T08:59:03.763061946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wpg6h,Uid:ad07cb0e-00cd-4be7-af4d-0af645bc7bc9,Namespace:kube-system,Attempt:0,} returns sandbox id \"c649998baa2dfb17ba4029c54eafc03746ed818bc76abba56d986b16de319746\"" Jul 2 08:59:03.919515 kubelet[1423]: E0702 08:59:03.918293 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:04.920522 kubelet[1423]: E0702 08:59:04.920418 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:05.297868 kubelet[1423]: E0702 08:59:05.295782 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:05.467155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2020239998.mount: Deactivated successfully. Jul 2 08:59:05.648217 env[1140]: time="2024-07-02T08:59:05.647882849Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:05.653069 env[1140]: time="2024-07-02T08:59:05.653004124Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:05.657739 env[1140]: time="2024-07-02T08:59:05.657713555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:05.659969 env[1140]: time="2024-07-02T08:59:05.659914502Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:05.660694 env[1140]: time="2024-07-02T08:59:05.660667435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 08:59:05.661902 env[1140]: time="2024-07-02T08:59:05.661876471Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 08:59:05.664113 env[1140]: time="2024-07-02T08:59:05.664047084Z" level=info msg="CreateContainer within sandbox \"bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 08:59:05.685839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1845699454.mount: Deactivated successfully. Jul 2 08:59:05.692898 env[1140]: time="2024-07-02T08:59:05.692780815Z" level=info msg="CreateContainer within sandbox \"bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161\"" Jul 2 08:59:05.694295 env[1140]: time="2024-07-02T08:59:05.694240008Z" level=info msg="StartContainer for \"b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161\"" Jul 2 08:59:05.740889 systemd[1]: run-containerd-runc-k8s.io-b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161-runc.5YRCMf.mount: Deactivated successfully. Jul 2 08:59:05.742493 systemd[1]: Started cri-containerd-b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161.scope. Jul 2 08:59:05.762000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.762000 audit[1567]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0858752cc8 items=0 ppid=1488 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:05.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353636326465386237336436626661656661346134643565383634 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit: BPF prog-id=66 op=LOAD Jul 2 08:59:05.763000 audit[1567]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000284788 items=0 ppid=1488 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:05.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353636326465386237336436626661656661346134643565383634 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.763000 audit: BPF prog-id=67 op=LOAD Jul 2 08:59:05.763000 audit[1567]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002847d8 items=0 ppid=1488 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:05.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353636326465386237336436626661656661346134643565383634 Jul 2 08:59:05.764000 audit: BPF prog-id=67 op=UNLOAD Jul 2 08:59:05.764000 audit: BPF prog-id=66 op=UNLOAD Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { perfmon } for pid=1567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit[1567]: AVC avc: denied { bpf } for pid=1567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:05.764000 audit: BPF prog-id=68 op=LOAD Jul 2 08:59:05.764000 audit[1567]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000284868 items=0 ppid=1488 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:05.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353636326465386237336436626661656661346134643565383634 Jul 2 08:59:05.794775 env[1140]: time="2024-07-02T08:59:05.794727277Z" level=info msg="StartContainer for \"b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161\" returns successfully" Jul 2 08:59:05.795385 systemd[1]: cri-containerd-b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161.scope: Deactivated successfully. Jul 2 08:59:05.798000 audit: BPF prog-id=68 op=UNLOAD Jul 2 08:59:05.924530 kubelet[1423]: E0702 08:59:05.921353 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:05.964702 env[1140]: time="2024-07-02T08:59:05.964593449Z" level=info msg="shim disconnected" id=b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161 Jul 2 08:59:05.964702 env[1140]: time="2024-07-02T08:59:05.964684713Z" level=warning msg="cleaning up after shim disconnected" id=b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161 namespace=k8s.io Jul 2 08:59:05.964702 env[1140]: time="2024-07-02T08:59:05.964710155Z" level=info msg="cleaning up dead shim" Jul 2 08:59:05.981703 env[1140]: time="2024-07-02T08:59:05.981629840Z" level=warning msg="cleanup warnings time=\"2024-07-02T08:59:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1607 runtime=io.containerd.runc.v2\n" Jul 2 08:59:06.677540 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b95662de8b73d6bfaefa4a4d5e864330fba3210722970586760379e7e820f161-rootfs.mount: Deactivated successfully. Jul 2 08:59:06.921863 kubelet[1423]: E0702 08:59:06.921749 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:07.298215 kubelet[1423]: E0702 08:59:07.298170 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:07.350142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount638221001.mount: Deactivated successfully. Jul 2 08:59:07.922435 kubelet[1423]: E0702 08:59:07.922390 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:08.196600 env[1140]: time="2024-07-02T08:59:08.196131204Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:08.200726 env[1140]: time="2024-07-02T08:59:08.200678203Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:08.203288 env[1140]: time="2024-07-02T08:59:08.203251900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:08.205597 env[1140]: time="2024-07-02T08:59:08.205566472Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:08.206203 env[1140]: time="2024-07-02T08:59:08.206172322Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:9c49592198fa15b509fe4ee4a538067866776e325d6dd33c77ad6647e1d3aac9\"" Jul 2 08:59:08.207714 env[1140]: time="2024-07-02T08:59:08.207686331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 08:59:08.208719 env[1140]: time="2024-07-02T08:59:08.208650071Z" level=info msg="CreateContainer within sandbox \"c649998baa2dfb17ba4029c54eafc03746ed818bc76abba56d986b16de319746\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 08:59:08.235367 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount682313685.mount: Deactivated successfully. Jul 2 08:59:08.240283 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2795617470.mount: Deactivated successfully. Jul 2 08:59:08.243340 env[1140]: time="2024-07-02T08:59:08.243283427Z" level=info msg="CreateContainer within sandbox \"c649998baa2dfb17ba4029c54eafc03746ed818bc76abba56d986b16de319746\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a097425dc8ed9295213bcf3396f167cb77823c918449937c36aadbfa7145400c\"" Jul 2 08:59:08.244273 env[1140]: time="2024-07-02T08:59:08.244245474Z" level=info msg="StartContainer for \"a097425dc8ed9295213bcf3396f167cb77823c918449937c36aadbfa7145400c\"" Jul 2 08:59:08.275991 systemd[1]: Started cri-containerd-a097425dc8ed9295213bcf3396f167cb77823c918449937c36aadbfa7145400c.scope. Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.298010 kernel: kauditd_printk_skb: 153 callbacks suppressed Jul 2 08:59:08.298094 kernel: audit: type=1400 audit(1719910748.295:460): avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd2380f80a8 items=0 ppid=1490 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.307134 kernel: audit: type=1300 audit(1719910748.295:460): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd2380f80a8 items=0 ppid=1490 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393734323564633865643932393532313362636633333936663136 Jul 2 08:59:08.316562 kernel: audit: type=1327 audit(1719910748.295:460): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393734323564633865643932393532313362636633333936663136 Jul 2 08:59:08.316623 kernel: audit: type=1400 audit(1719910748.295:461): avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.324166 kernel: audit: type=1400 audit(1719910748.295:461): avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.324224 kernel: audit: type=1400 audit(1719910748.295:461): avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.327611 kernel: audit: type=1400 audit(1719910748.295:461): avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.331893 kernel: audit: type=1400 audit(1719910748.295:461): avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.339305 kernel: audit: type=1400 audit(1719910748.295:461): avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.339429 kernel: audit: type=1400 audit(1719910748.295:461): avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.295000 audit: BPF prog-id=69 op=LOAD Jul 2 08:59:08.295000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f91b8 items=0 ppid=1490 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393734323564633865643932393532313362636633333936663136 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.301000 audit: BPF prog-id=70 op=LOAD Jul 2 08:59:08.301000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f9208 items=0 ppid=1490 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393734323564633865643932393532313362636633333936663136 Jul 2 08:59:08.307000 audit: BPF prog-id=70 op=UNLOAD Jul 2 08:59:08.307000 audit: BPF prog-id=69 op=UNLOAD Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:08.307000 audit: BPF prog-id=71 op=LOAD Jul 2 08:59:08.307000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9298 items=0 ppid=1490 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393734323564633865643932393532313362636633333936663136 Jul 2 08:59:08.352090 env[1140]: time="2024-07-02T08:59:08.352032510Z" level=info msg="StartContainer for \"a097425dc8ed9295213bcf3396f167cb77823c918449937c36aadbfa7145400c\" returns successfully" Jul 2 08:59:08.412000 audit[1682]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.412000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4d26bcc0 a2=0 a3=7fff4d26bcac items=0 ppid=1642 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 08:59:08.413000 audit[1683]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.413000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeca5726c0 a2=0 a3=7ffeca5726ac items=0 ppid=1642 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 08:59:08.413000 audit[1684]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.413000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4fcb0a30 a2=0 a3=7ffe4fcb0a1c items=0 ppid=1642 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 08:59:08.414000 audit[1685]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.414000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff512cc830 a2=0 a3=7fff512cc81c items=0 ppid=1642 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 08:59:08.414000 audit[1686]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.414000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb8ded7f0 a2=0 a3=7ffcb8ded7dc items=0 ppid=1642 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 08:59:08.416000 audit[1687]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.416000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda811ca10 a2=0 a3=7ffda811c9fc items=0 ppid=1642 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 08:59:08.518000 audit[1688]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.518000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff91ca6b10 a2=0 a3=7fff91ca6afc items=0 ppid=1642 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 08:59:08.526000 audit[1690]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.526000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff98b05990 a2=0 a3=7fff98b0597c items=0 ppid=1642 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 08:59:08.533000 audit[1693]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.533000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd7bbea620 a2=0 a3=7ffd7bbea60c items=0 ppid=1642 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 08:59:08.536000 audit[1694]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.536000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde6f56d10 a2=0 a3=7ffde6f56cfc items=0 ppid=1642 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 08:59:08.542000 audit[1696]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.542000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2a78e7c0 a2=0 a3=7fff2a78e7ac items=0 ppid=1642 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 08:59:08.544000 audit[1697]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.544000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca6afcf60 a2=0 a3=7ffca6afcf4c items=0 ppid=1642 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 08:59:08.552000 audit[1699]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.552000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7c882b80 a2=0 a3=7ffd7c882b6c items=0 ppid=1642 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 08:59:08.561000 audit[1702]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.561000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe81ca9330 a2=0 a3=7ffe81ca931c items=0 ppid=1642 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 08:59:08.564000 audit[1703]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.564000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca0fe0d40 a2=0 a3=7ffca0fe0d2c items=0 ppid=1642 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 08:59:08.569000 audit[1705]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.569000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeae7bac50 a2=0 a3=7ffeae7bac3c items=0 ppid=1642 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 08:59:08.572000 audit[1706]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.572000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebf29bda0 a2=0 a3=7ffebf29bd8c items=0 ppid=1642 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 08:59:08.578000 audit[1708]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.578000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5cb6a550 a2=0 a3=7ffe5cb6a53c items=0 ppid=1642 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:59:08.586000 audit[1711]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.586000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc25fa9c70 a2=0 a3=7ffc25fa9c5c items=0 ppid=1642 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:59:08.594000 audit[1714]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.594000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde5d7e1d0 a2=0 a3=7ffde5d7e1bc items=0 ppid=1642 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 08:59:08.597000 audit[1715]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.597000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff215092b0 a2=0 a3=7fff2150929c items=0 ppid=1642 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 08:59:08.602000 audit[1717]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.602000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff41307bb0 a2=0 a3=7fff41307b9c items=0 ppid=1642 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:59:08.662000 audit[1722]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.662000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff6076f270 a2=0 a3=7fff6076f25c items=0 ppid=1642 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:59:08.664000 audit[1723]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.664000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2eeee9a0 a2=0 a3=7ffd2eeee98c items=0 ppid=1642 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 08:59:08.669000 audit[1725]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 08:59:08.669000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc9f801d60 a2=0 a3=7ffc9f801d4c items=0 ppid=1642 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 08:59:08.682000 audit[1731]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:08.682000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd05558b60 a2=0 a3=7ffd05558b4c items=0 ppid=1642 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:08.710000 audit[1731]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:08.710000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffd05558b60 a2=0 a3=7ffd05558b4c items=0 ppid=1642 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:08.724000 audit[1739]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.724000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee71542d0 a2=0 a3=7ffee71542bc items=0 ppid=1642 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 08:59:08.727000 audit[1741]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.727000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe21443810 a2=0 a3=7ffe214437fc items=0 ppid=1642 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 08:59:08.731000 audit[1744]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.731000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd3ca61080 a2=0 a3=7ffd3ca6106c items=0 ppid=1642 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 08:59:08.732000 audit[1745]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.732000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6fcce710 a2=0 a3=7ffc6fcce6fc items=0 ppid=1642 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 08:59:08.734000 audit[1747]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.734000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffddbdb3ce0 a2=0 a3=7ffddbdb3ccc items=0 ppid=1642 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 08:59:08.735000 audit[1748]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.735000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8cc9b190 a2=0 a3=7ffe8cc9b17c items=0 ppid=1642 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 08:59:08.738000 audit[1750]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.738000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5451d660 a2=0 a3=7fff5451d64c items=0 ppid=1642 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 08:59:08.742000 audit[1753]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.742000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffea098f1b0 a2=0 a3=7ffea098f19c items=0 ppid=1642 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 08:59:08.743000 audit[1754]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.743000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4069ce90 a2=0 a3=7ffd4069ce7c items=0 ppid=1642 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 08:59:08.746000 audit[1756]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.746000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff237345e0 a2=0 a3=7fff237345cc items=0 ppid=1642 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 08:59:08.748000 audit[1757]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.748000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc13f38a0 a2=0 a3=7ffcc13f388c items=0 ppid=1642 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 08:59:08.752000 audit[1759]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.752000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde0589600 a2=0 a3=7ffde05895ec items=0 ppid=1642 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 08:59:08.756000 audit[1762]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.756000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4d22e350 a2=0 a3=7ffc4d22e33c items=0 ppid=1642 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 08:59:08.766949 update_engine[1135]: I0702 08:59:08.766886 1135 update_attempter.cc:509] Updating boot flags... Jul 2 08:59:08.770000 audit[1765]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.770000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc508d970 a2=0 a3=7ffcc508d95c items=0 ppid=1642 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 08:59:08.774000 audit[1767]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.774000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff886863e0 a2=0 a3=7fff886863cc items=0 ppid=1642 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 08:59:08.780000 audit[1770]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.780000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffec9397a30 a2=0 a3=7ffec9397a1c items=0 ppid=1642 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:59:08.786000 audit[1773]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.786000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc8161fe60 a2=0 a3=7ffc8161fe4c items=0 ppid=1642 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 08:59:08.789000 audit[1775]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.789000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeac31ec10 a2=0 a3=7ffeac31ebfc items=0 ppid=1642 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.789000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 08:59:08.797000 audit[1778]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.797000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc116b3fc0 a2=0 a3=7ffc116b3fac items=0 ppid=1642 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 08:59:08.808000 audit[1780]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.808000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff30d9a190 a2=0 a3=7fff30d9a17c items=0 ppid=1642 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 08:59:08.827000 audit[1788]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.827000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4a6b3900 a2=0 a3=7ffc4a6b38ec items=0 ppid=1642 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:59:08.841000 audit[1792]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 08:59:08.841000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe45c1dcc0 a2=0 a3=7ffe45c1dcac items=0 ppid=1642 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 08:59:08.845000 audit[1794]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 08:59:08.845000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc7ea25c20 a2=0 a3=7ffc7ea25c0c items=0 ppid=1642 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.845000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:08.846000 audit[1794]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 08:59:08.846000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc7ea25c20 a2=0 a3=7ffc7ea25c0c items=0 ppid=1642 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:08.846000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:08.923222 kubelet[1423]: E0702 08:59:08.923079 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:09.296152 kubelet[1423]: E0702 08:59:09.296086 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:09.349011 kubelet[1423]: I0702 08:59:09.348921 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wpg6h" podStartSLOduration=3.906299744 podStartE2EDuration="8.348636281s" podCreationTimestamp="2024-07-02 08:59:01 +0000 UTC" firstStartedPulling="2024-07-02 08:59:03.764254861 +0000 UTC m=+4.113463099" lastFinishedPulling="2024-07-02 08:59:08.206591398 +0000 UTC m=+8.555799636" observedRunningTime="2024-07-02 08:59:09.348611513 +0000 UTC m=+9.697819801" watchObservedRunningTime="2024-07-02 08:59:09.348636281 +0000 UTC m=+9.697844569" Jul 2 08:59:09.925104 kubelet[1423]: E0702 08:59:09.925018 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:10.926144 kubelet[1423]: E0702 08:59:10.925865 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:11.297543 kubelet[1423]: E0702 08:59:11.297499 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:11.926959 kubelet[1423]: E0702 08:59:11.926891 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:12.927883 kubelet[1423]: E0702 08:59:12.927838 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:13.296279 kubelet[1423]: E0702 08:59:13.296215 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:13.929106 kubelet[1423]: E0702 08:59:13.929035 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:14.929742 kubelet[1423]: E0702 08:59:14.929707 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:15.299306 kubelet[1423]: E0702 08:59:15.299230 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:15.931021 kubelet[1423]: E0702 08:59:15.930946 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:16.152550 env[1140]: time="2024-07-02T08:59:16.152441889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:16.159099 env[1140]: time="2024-07-02T08:59:16.158999654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:16.163919 env[1140]: time="2024-07-02T08:59:16.163790540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:16.168303 env[1140]: time="2024-07-02T08:59:16.168231961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:16.170419 env[1140]: time="2024-07-02T08:59:16.170340769Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 08:59:16.177593 env[1140]: time="2024-07-02T08:59:16.177382467Z" level=info msg="CreateContainer within sandbox \"bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 08:59:16.211002 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount91221918.mount: Deactivated successfully. Jul 2 08:59:16.222931 env[1140]: time="2024-07-02T08:59:16.222774737Z" level=info msg="CreateContainer within sandbox \"bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8\"" Jul 2 08:59:16.224449 env[1140]: time="2024-07-02T08:59:16.224358259Z" level=info msg="StartContainer for \"0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8\"" Jul 2 08:59:16.327431 systemd[1]: Started cri-containerd-0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8.scope. Jul 2 08:59:16.383000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.385767 kernel: kauditd_printk_skb: 186 callbacks suppressed Jul 2 08:59:16.385865 kernel: audit: type=1400 audit(1719910756.383:517): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.383000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f12d571e9b8 items=0 ppid=1488 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:16.394325 kernel: audit: type=1300 audit(1719910756.383:517): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f12d571e9b8 items=0 ppid=1488 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:16.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653963313465303863633334643232373062353864333762336638 Jul 2 08:59:16.399430 kernel: audit: type=1327 audit(1719910756.383:517): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653963313465303863633334643232373062353864333762336638 Jul 2 08:59:16.399478 kernel: audit: type=1400 audit(1719910756.384:518): avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.403628 kernel: audit: type=1400 audit(1719910756.384:518): avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.414544 kernel: audit: type=1400 audit(1719910756.384:518): avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.415330 kernel: audit: type=1400 audit(1719910756.384:518): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.421904 kernel: audit: type=1400 audit(1719910756.384:518): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.434613 kernel: audit: type=1400 audit(1719910756.384:518): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.434719 kernel: audit: type=1400 audit(1719910756.384:518): avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.384000 audit: BPF prog-id=72 op=LOAD Jul 2 08:59:16.384000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00027ce58 items=0 ppid=1488 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:16.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653963313465303863633334643232373062353864333762336638 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.388000 audit: BPF prog-id=73 op=LOAD Jul 2 08:59:16.388000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00027cea8 items=0 ppid=1488 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:16.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653963313465303863633334643232373062353864333762336638 Jul 2 08:59:16.393000 audit: BPF prog-id=73 op=UNLOAD Jul 2 08:59:16.393000 audit: BPF prog-id=72 op=UNLOAD Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:16.393000 audit: BPF prog-id=74 op=LOAD Jul 2 08:59:16.393000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00027cf38 items=0 ppid=1488 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:16.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062653963313465303863633334643232373062353864333762336638 Jul 2 08:59:16.458279 env[1140]: time="2024-07-02T08:59:16.458213497Z" level=info msg="StartContainer for \"0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8\" returns successfully" Jul 2 08:59:16.933249 kubelet[1423]: E0702 08:59:16.933059 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:17.296212 kubelet[1423]: E0702 08:59:17.296171 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:17.935099 kubelet[1423]: E0702 08:59:17.935013 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:18.424751 env[1140]: time="2024-07-02T08:59:18.424544919Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 08:59:18.427365 systemd[1]: cri-containerd-0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8.scope: Deactivated successfully. Jul 2 08:59:18.427636 systemd[1]: cri-containerd-0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8.scope: Consumed 1.095s CPU time. Jul 2 08:59:18.430000 audit: BPF prog-id=74 op=UNLOAD Jul 2 08:59:18.442205 kubelet[1423]: I0702 08:59:18.441161 1423 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 08:59:18.461608 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8-rootfs.mount: Deactivated successfully. Jul 2 08:59:18.935557 kubelet[1423]: E0702 08:59:18.935440 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:19.119268 env[1140]: time="2024-07-02T08:59:19.119146789Z" level=info msg="shim disconnected" id=0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8 Jul 2 08:59:19.119654 env[1140]: time="2024-07-02T08:59:19.119299461Z" level=warning msg="cleaning up after shim disconnected" id=0be9c14e08cc34d2270b58d37b3f85d516f7ce3f297ba45b2bd6b74d2bd4e6f8 namespace=k8s.io Jul 2 08:59:19.119654 env[1140]: time="2024-07-02T08:59:19.119356997Z" level=info msg="cleaning up dead shim" Jul 2 08:59:19.151033 env[1140]: time="2024-07-02T08:59:19.150912810Z" level=warning msg="cleanup warnings time=\"2024-07-02T08:59:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1844 runtime=io.containerd.runc.v2\n" Jul 2 08:59:19.307654 systemd[1]: Created slice kubepods-besteffort-pod9771cf57_545a_4bc6_9c54_0f209c12eec3.slice. Jul 2 08:59:19.312748 env[1140]: time="2024-07-02T08:59:19.312677288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-27bnv,Uid:9771cf57-545a-4bc6-9c54-0f209c12eec3,Namespace:calico-system,Attempt:0,}" Jul 2 08:59:19.391143 env[1140]: time="2024-07-02T08:59:19.391044790Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 08:59:19.492739 env[1140]: time="2024-07-02T08:59:19.492646703Z" level=error msg="Failed to destroy network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:19.495217 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083-shm.mount: Deactivated successfully. Jul 2 08:59:19.496737 env[1140]: time="2024-07-02T08:59:19.496674178Z" level=error msg="encountered an error cleaning up failed sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:19.496984 env[1140]: time="2024-07-02T08:59:19.496932841Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-27bnv,Uid:9771cf57-545a-4bc6-9c54-0f209c12eec3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:19.497413 kubelet[1423]: E0702 08:59:19.497372 1423 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:19.497499 kubelet[1423]: E0702 08:59:19.497459 1423 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-27bnv" Jul 2 08:59:19.497499 kubelet[1423]: E0702 08:59:19.497489 1423 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-27bnv" Jul 2 08:59:19.497590 kubelet[1423]: E0702 08:59:19.497561 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-27bnv_calico-system(9771cf57-545a-4bc6-9c54-0f209c12eec3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-27bnv_calico-system(9771cf57-545a-4bc6-9c54-0f209c12eec3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:19.936207 kubelet[1423]: E0702 08:59:19.936081 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:20.392207 kubelet[1423]: I0702 08:59:20.392116 1423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 08:59:20.394142 env[1140]: time="2024-07-02T08:59:20.393617100Z" level=info msg="StopPodSandbox for \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\"" Jul 2 08:59:20.542506 env[1140]: time="2024-07-02T08:59:20.542393645Z" level=error msg="StopPodSandbox for \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\" failed" error="failed to destroy network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:20.542917 kubelet[1423]: E0702 08:59:20.542856 1423 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 08:59:20.543020 kubelet[1423]: E0702 08:59:20.542996 1423 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083"} Jul 2 08:59:20.543126 kubelet[1423]: E0702 08:59:20.543092 1423 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9771cf57-545a-4bc6-9c54-0f209c12eec3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:59:20.543219 kubelet[1423]: E0702 08:59:20.543182 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9771cf57-545a-4bc6-9c54-0f209c12eec3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-27bnv" podUID="9771cf57-545a-4bc6-9c54-0f209c12eec3" Jul 2 08:59:20.914652 kubelet[1423]: E0702 08:59:20.914558 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:20.937363 kubelet[1423]: E0702 08:59:20.937273 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:21.937838 kubelet[1423]: E0702 08:59:21.937724 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:22.579027 kubelet[1423]: I0702 08:59:22.578970 1423 topology_manager.go:215] "Topology Admit Handler" podUID="62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f" podNamespace="default" podName="nginx-deployment-6d5f899847-mwmlm" Jul 2 08:59:22.589224 systemd[1]: Created slice kubepods-besteffort-pod62e4d6b5_ed2d_4ed6_ab9b_36a4b863154f.slice. Jul 2 08:59:22.649561 kubelet[1423]: I0702 08:59:22.649511 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zfwgw\" (UniqueName: \"kubernetes.io/projected/62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f-kube-api-access-zfwgw\") pod \"nginx-deployment-6d5f899847-mwmlm\" (UID: \"62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f\") " pod="default/nginx-deployment-6d5f899847-mwmlm" Jul 2 08:59:22.897059 env[1140]: time="2024-07-02T08:59:22.896631075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mwmlm,Uid:62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f,Namespace:default,Attempt:0,}" Jul 2 08:59:22.938648 kubelet[1423]: E0702 08:59:22.938607 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:23.079549 env[1140]: time="2024-07-02T08:59:23.079488866Z" level=error msg="Failed to destroy network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:23.082370 env[1140]: time="2024-07-02T08:59:23.081455920Z" level=error msg="encountered an error cleaning up failed sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:23.082370 env[1140]: time="2024-07-02T08:59:23.081512129Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mwmlm,Uid:62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:23.082496 kubelet[1423]: E0702 08:59:23.081727 1423 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:23.082496 kubelet[1423]: E0702 08:59:23.081781 1423 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-mwmlm" Jul 2 08:59:23.082496 kubelet[1423]: E0702 08:59:23.081822 1423 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-mwmlm" Jul 2 08:59:23.081568 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10-shm.mount: Deactivated successfully. Jul 2 08:59:23.082665 kubelet[1423]: E0702 08:59:23.081882 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-mwmlm_default(62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-mwmlm_default(62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-mwmlm" podUID="62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f" Jul 2 08:59:23.398844 kubelet[1423]: I0702 08:59:23.398560 1423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 08:59:23.399633 env[1140]: time="2024-07-02T08:59:23.399597240Z" level=info msg="StopPodSandbox for \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\"" Jul 2 08:59:23.490402 env[1140]: time="2024-07-02T08:59:23.490339851Z" level=error msg="StopPodSandbox for \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\" failed" error="failed to destroy network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 08:59:23.490882 kubelet[1423]: E0702 08:59:23.490700 1423 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 08:59:23.490882 kubelet[1423]: E0702 08:59:23.490756 1423 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10"} Jul 2 08:59:23.490882 kubelet[1423]: E0702 08:59:23.490825 1423 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 08:59:23.490882 kubelet[1423]: E0702 08:59:23.490862 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-mwmlm" podUID="62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f" Jul 2 08:59:23.939956 kubelet[1423]: E0702 08:59:23.939840 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:24.940539 kubelet[1423]: E0702 08:59:24.940463 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:25.941400 kubelet[1423]: E0702 08:59:25.941280 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:26.941906 kubelet[1423]: E0702 08:59:26.941776 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:27.942004 kubelet[1423]: E0702 08:59:27.941966 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:28.942754 kubelet[1423]: E0702 08:59:28.942694 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:29.943689 kubelet[1423]: E0702 08:59:29.943620 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:30.056915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4923047.mount: Deactivated successfully. Jul 2 08:59:30.107372 env[1140]: time="2024-07-02T08:59:30.107293520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:30.112881 env[1140]: time="2024-07-02T08:59:30.112760620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:30.119462 env[1140]: time="2024-07-02T08:59:30.119431753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:30.121277 env[1140]: time="2024-07-02T08:59:30.121250742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:30.121620 env[1140]: time="2024-07-02T08:59:30.121596921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 08:59:30.146583 env[1140]: time="2024-07-02T08:59:30.146532577Z" level=info msg="CreateContainer within sandbox \"bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 08:59:30.165358 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1518248556.mount: Deactivated successfully. Jul 2 08:59:30.178621 env[1140]: time="2024-07-02T08:59:30.178584890Z" level=info msg="CreateContainer within sandbox \"bc764b9a8410f870d9973c5aaa4d701a4ec708bf126d5c3a45b62cdca551012a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e6f7f5a38e72b34cf4a5b908a51022c762f0e28ced705ef1774f97fb7d420829\"" Jul 2 08:59:30.179411 env[1140]: time="2024-07-02T08:59:30.179387958Z" level=info msg="StartContainer for \"e6f7f5a38e72b34cf4a5b908a51022c762f0e28ced705ef1774f97fb7d420829\"" Jul 2 08:59:30.204754 systemd[1]: Started cri-containerd-e6f7f5a38e72b34cf4a5b908a51022c762f0e28ced705ef1774f97fb7d420829.scope. Jul 2 08:59:30.252108 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 08:59:30.252217 kernel: audit: type=1400 audit(1719910770.246:524): avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f04002536d8 items=0 ppid=1488 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:30.258011 kernel: audit: type=1300 audit(1719910770.246:524): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f04002536d8 items=0 ppid=1488 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:30.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663766356133386537326233346366346135623930386135313032 Jul 2 08:59:30.263766 kernel: audit: type=1327 audit(1719910770.246:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663766356133386537326233346366346135623930386135313032 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.275954 kernel: audit: type=1400 audit(1719910770.246:525): avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.276026 kernel: audit: type=1400 audit(1719910770.246:525): avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.279598 kernel: audit: type=1400 audit(1719910770.246:525): avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.283180 kernel: audit: type=1400 audit(1719910770.246:525): avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.288888 kernel: audit: type=1400 audit(1719910770.246:525): avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.296037 kernel: audit: type=1400 audit(1719910770.246:525): avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.298418 kernel: audit: type=1400 audit(1719910770.246:525): avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit: BPF prog-id=75 op=LOAD Jul 2 08:59:30.246000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c8068 items=0 ppid=1488 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:30.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663766356133386537326233346366346135623930386135313032 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.246000 audit: BPF prog-id=76 op=LOAD Jul 2 08:59:30.246000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c80b8 items=0 ppid=1488 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:30.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663766356133386537326233346366346135623930386135313032 Jul 2 08:59:30.246000 audit: BPF prog-id=76 op=UNLOAD Jul 2 08:59:30.247000 audit: BPF prog-id=75 op=UNLOAD Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:30.247000 audit: BPF prog-id=77 op=LOAD Jul 2 08:59:30.247000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c8148 items=0 ppid=1488 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:30.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663766356133386537326233346366346135623930386135313032 Jul 2 08:59:30.300629 env[1140]: time="2024-07-02T08:59:30.300585620Z" level=info msg="StartContainer for \"e6f7f5a38e72b34cf4a5b908a51022c762f0e28ced705ef1774f97fb7d420829\" returns successfully" Jul 2 08:59:30.406900 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 08:59:30.407947 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 08:59:30.463317 kubelet[1423]: I0702 08:59:30.463180 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-mfpx7" podStartSLOduration=3.096343704 podStartE2EDuration="29.463113162s" podCreationTimestamp="2024-07-02 08:59:01 +0000 UTC" firstStartedPulling="2024-07-02 08:59:03.755248559 +0000 UTC m=+4.104456797" lastFinishedPulling="2024-07-02 08:59:30.122017976 +0000 UTC m=+30.471226255" observedRunningTime="2024-07-02 08:59:30.458020069 +0000 UTC m=+30.807228357" watchObservedRunningTime="2024-07-02 08:59:30.463113162 +0000 UTC m=+30.812321430" Jul 2 08:59:30.944568 kubelet[1423]: E0702 08:59:30.944494 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:31.466570 systemd[1]: run-containerd-runc-k8s.io-e6f7f5a38e72b34cf4a5b908a51022c762f0e28ced705ef1774f97fb7d420829-runc.idwN6u.mount: Deactivated successfully. Jul 2 08:59:31.945597 kubelet[1423]: E0702 08:59:31.945538 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:31.949000 audit[2132]: AVC avc: denied { write } for pid=2132 comm="tee" name="fd" dev="proc" ino=19516 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:59:31.950000 audit[2130]: AVC avc: denied { write } for pid=2130 comm="tee" name="fd" dev="proc" ino=19519 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:59:31.950000 audit[2130]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe431549ff a2=241 a3=1b6 items=1 ppid=2091 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:31.950000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 08:59:31.950000 audit: PATH item=0 name="/dev/fd/63" inode=19508 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:59:31.950000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:59:31.949000 audit[2132]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd18bdca0f a2=241 a3=1b6 items=1 ppid=2097 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:31.949000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 08:59:31.949000 audit: PATH item=0 name="/dev/fd/63" inode=19511 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:59:31.949000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:59:31.952000 audit[2127]: AVC avc: denied { write } for pid=2127 comm="tee" name="fd" dev="proc" ino=19034 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:59:31.956000 audit[2115]: AVC avc: denied { write } for pid=2115 comm="tee" name="fd" dev="proc" ino=19046 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:59:31.956000 audit[2115]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe27c27a11 a2=241 a3=1b6 items=1 ppid=2086 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:31.956000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 08:59:31.956000 audit: PATH item=0 name="/dev/fd/63" inode=19500 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:59:31.956000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:59:31.952000 audit[2127]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3bbeaa00 a2=241 a3=1b6 items=1 ppid=2089 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:31.952000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 08:59:31.952000 audit: PATH item=0 name="/dev/fd/63" inode=19505 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:59:31.952000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:59:31.961000 audit[2145]: AVC avc: denied { write } for pid=2145 comm="tee" name="fd" dev="proc" ino=19525 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:59:31.962000 audit[2143]: AVC avc: denied { write } for pid=2143 comm="tee" name="fd" dev="proc" ino=19528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:59:31.962000 audit[2143]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef6de6a10 a2=241 a3=1b6 items=1 ppid=2087 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:31.962000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 08:59:31.962000 audit: PATH item=0 name="/dev/fd/63" inode=19038 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:59:31.962000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:59:31.961000 audit[2145]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd100afa0f a2=241 a3=1b6 items=1 ppid=2093 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:31.961000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 08:59:31.961000 audit: PATH item=0 name="/dev/fd/63" inode=19522 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:59:31.961000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:59:31.975000 audit[2147]: AVC avc: denied { write } for pid=2147 comm="tee" name="fd" dev="proc" ino=19533 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 08:59:31.975000 audit[2147]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc23ccba0f a2=241 a3=1b6 items=1 ppid=2095 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:31.975000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 08:59:31.975000 audit: PATH item=0 name="/dev/fd/63" inode=19043 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 08:59:31.975000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 08:59:32.200909 kernel: Initializing XFRM netlink socket Jul 2 08:59:32.387498 systemd-networkd[977]: vxlan.calico: Link UP Jul 2 08:59:32.387513 systemd-networkd[977]: vxlan.calico: Gained carrier Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.426000 audit: BPF prog-id=78 op=LOAD Jul 2 08:59:32.426000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe50178460 a2=70 a3=7f610a6eb000 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.426000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.427000 audit: BPF prog-id=78 op=UNLOAD Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit: BPF prog-id=79 op=LOAD Jul 2 08:59:32.427000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe50178460 a2=70 a3=6f items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.427000 audit: BPF prog-id=79 op=UNLOAD Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe50178410 a2=70 a3=470860 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit: BPF prog-id=80 op=LOAD Jul 2 08:59:32.427000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe501783f0 a2=70 a3=7ffe50178460 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.427000 audit: BPF prog-id=80 op=UNLOAD Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe501784d0 a2=70 a3=0 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe501784c0 a2=70 a3=0 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.427000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.427000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe50178430 a2=70 a3=0 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.427000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.428000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.428000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe50178500 a2=70 a3=fe00 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.428000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.428000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe50178500 a2=70 a3=fe00 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.428000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.430000 audit: BPF prog-id=81 op=LOAD Jul 2 08:59:32.430000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe50178420 a2=70 a3=0 items=0 ppid=2101 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 08:59:32.436000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.436000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4ba1ecd0 a2=70 a3=ffff items=0 ppid=2101 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 08:59:32.436000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:32.436000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4ba1eba0 a2=70 a3=3 items=0 ppid=2101 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 08:59:32.442195 systemd-networkd[977]: calico_tmp_A: Failed to manage SR-IOV PF and VF ports, ignoring: Invalid argument Jul 2 08:59:32.445000 audit: BPF prog-id=81 op=UNLOAD Jul 2 08:59:32.512000 audit[2257]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:32.512000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd1f55d2f0 a2=0 a3=7ffd1f55d2dc items=0 ppid=2101 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.512000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:32.524000 audit[2256]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:32.524000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe06499a20 a2=0 a3=7ffe06499a0c items=0 ppid=2101 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.524000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:32.525000 audit[2255]: NETFILTER_CFG table=raw:67 family=2 entries=19 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:32.525000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fff17210060 a2=0 a3=7fff1721004c items=0 ppid=2101 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.525000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:32.526000 audit[2259]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:32.526000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff5e829790 a2=0 a3=7fff5e82977c items=0 ppid=2101 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:32.526000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:32.946281 kubelet[1423]: E0702 08:59:32.946197 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:33.888496 systemd-networkd[977]: vxlan.calico: Gained IPv6LL Jul 2 08:59:33.947516 kubelet[1423]: E0702 08:59:33.947408 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:34.298290 env[1140]: time="2024-07-02T08:59:34.298185859Z" level=info msg="StopPodSandbox for \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\"" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.484 [INFO][2284] k8s.go 608: Cleaning up netns ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.492 [INFO][2284] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" iface="eth0" netns="/var/run/netns/cni-4c81b0f2-16a8-78cb-f4ec-d5478b4d5895" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.493 [INFO][2284] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" iface="eth0" netns="/var/run/netns/cni-4c81b0f2-16a8-78cb-f4ec-d5478b4d5895" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.494 [INFO][2284] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" iface="eth0" netns="/var/run/netns/cni-4c81b0f2-16a8-78cb-f4ec-d5478b4d5895" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.494 [INFO][2284] k8s.go 615: Releasing IP address(es) ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.494 [INFO][2284] utils.go 188: Calico CNI releasing IP address ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.558 [INFO][2290] ipam_plugin.go 411: Releasing address using handleID ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.559 [INFO][2290] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.559 [INFO][2290] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.580 [WARNING][2290] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.580 [INFO][2290] ipam_plugin.go 439: Releasing address using workloadID ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.583 [INFO][2290] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:59:34.587632 env[1140]: 2024-07-02 08:59:34.585 [INFO][2284] k8s.go 621: Teardown processing complete. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 08:59:34.590314 env[1140]: time="2024-07-02T08:59:34.590269522Z" level=info msg="TearDown network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\" successfully" Jul 2 08:59:34.590420 env[1140]: time="2024-07-02T08:59:34.590399810Z" level=info msg="StopPodSandbox for \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\" returns successfully" Jul 2 08:59:34.591193 env[1140]: time="2024-07-02T08:59:34.591167609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mwmlm,Uid:62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f,Namespace:default,Attempt:1,}" Jul 2 08:59:34.592866 systemd[1]: run-netns-cni\x2d4c81b0f2\x2d16a8\x2d78cb\x2df4ec\x2dd5478b4d5895.mount: Deactivated successfully. Jul 2 08:59:34.841301 systemd-networkd[977]: cali6ff862bd332: Link UP Jul 2 08:59:34.845071 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:59:34.845245 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ff862bd332: link becomes ready Jul 2 08:59:34.846655 systemd-networkd[977]: cali6ff862bd332: Gained carrier Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.689 [INFO][2296] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0 nginx-deployment-6d5f899847- default 62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f 1205 0 2024-07-02 08:59:22 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.73 nginx-deployment-6d5f899847-mwmlm eth0 default [] [] [kns.default ksa.default.default] cali6ff862bd332 [] []}} ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.690 [INFO][2296] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.743 [INFO][2309] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" HandleID="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.773 [INFO][2309] ipam_plugin.go 264: Auto assigning IP ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" HandleID="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030a2e0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.73", "pod":"nginx-deployment-6d5f899847-mwmlm", "timestamp":"2024-07-02 08:59:34.743724532 +0000 UTC"}, Hostname:"172.24.4.73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.773 [INFO][2309] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.773 [INFO][2309] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.773 [INFO][2309] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.73' Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.777 [INFO][2309] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.788 [INFO][2309] ipam.go 372: Looking up existing affinities for host host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.798 [INFO][2309] ipam.go 489: Trying affinity for 192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.801 [INFO][2309] ipam.go 155: Attempting to load block cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.805 [INFO][2309] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.805 [INFO][2309] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.64/26 handle="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.809 [INFO][2309] ipam.go 1685: Creating new handle: k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025 Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.816 [INFO][2309] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.64/26 handle="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.825 [INFO][2309] ipam.go 1216: Successfully claimed IPs: [192.168.8.65/26] block=192.168.8.64/26 handle="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.825 [INFO][2309] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.65/26] handle="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" host="172.24.4.73" Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.825 [INFO][2309] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:59:34.864408 env[1140]: 2024-07-02 08:59:34.826 [INFO][2309] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.8.65/26] IPv6=[] ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" HandleID="k8s-pod-network.c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.870784 env[1140]: 2024-07-02 08:59:34.832 [INFO][2296] k8s.go 386: Populated endpoint ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"", Pod:"nginx-deployment-6d5f899847-mwmlm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6ff862bd332", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:59:34.870784 env[1140]: 2024-07-02 08:59:34.832 [INFO][2296] k8s.go 387: Calico CNI using IPs: [192.168.8.65/32] ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.870784 env[1140]: 2024-07-02 08:59:34.832 [INFO][2296] dataplane_linux.go 68: Setting the host side veth name to cali6ff862bd332 ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.870784 env[1140]: 2024-07-02 08:59:34.846 [INFO][2296] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.870784 env[1140]: 2024-07-02 08:59:34.847 [INFO][2296] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025", Pod:"nginx-deployment-6d5f899847-mwmlm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6ff862bd332", MAC:"26:51:b5:f8:9d:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:59:34.870784 env[1140]: 2024-07-02 08:59:34.861 [INFO][2296] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025" Namespace="default" Pod="nginx-deployment-6d5f899847-mwmlm" WorkloadEndpoint="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 08:59:34.902000 audit[2327]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:34.902000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffe560bd7e0 a2=0 a3=7ffe560bd7cc items=0 ppid=2101 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:34.902000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:34.917296 env[1140]: time="2024-07-02T08:59:34.917171340Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:59:34.917457 env[1140]: time="2024-07-02T08:59:34.917352592Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:59:34.917497 env[1140]: time="2024-07-02T08:59:34.917444792Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:59:34.917887 env[1140]: time="2024-07-02T08:59:34.917784621Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025 pid=2335 runtime=io.containerd.runc.v2 Jul 2 08:59:34.946316 systemd[1]: Started cri-containerd-c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025.scope. Jul 2 08:59:34.949147 kubelet[1423]: E0702 08:59:34.948961 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.959000 audit: BPF prog-id=82 op=LOAD Jul 2 08:59:34.961000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.961000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:34.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646262393934303031373738663135396535373332346266613566 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:34.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646262393934303031373738663135396535373332346266613566 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit: BPF prog-id=83 op=LOAD Jul 2 08:59:34.962000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003f20b0 items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:34.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646262393934303031373738663135396535373332346266613566 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit: BPF prog-id=84 op=LOAD Jul 2 08:59:34.962000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003f20f8 items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:34.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646262393934303031373738663135396535373332346266613566 Jul 2 08:59:34.962000 audit: BPF prog-id=84 op=UNLOAD Jul 2 08:59:34.962000 audit: BPF prog-id=83 op=UNLOAD Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:34.962000 audit: BPF prog-id=85 op=LOAD Jul 2 08:59:34.962000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f2508 items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:34.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646262393934303031373738663135396535373332346266613566 Jul 2 08:59:34.993897 env[1140]: time="2024-07-02T08:59:34.993840179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mwmlm,Uid:62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f,Namespace:default,Attempt:1,} returns sandbox id \"c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025\"" Jul 2 08:59:34.995607 env[1140]: time="2024-07-02T08:59:34.995544123Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 08:59:35.950095 kubelet[1423]: E0702 08:59:35.949995 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:36.297605 env[1140]: time="2024-07-02T08:59:36.297529348Z" level=info msg="StopPodSandbox for \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\"" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.446 [INFO][2383] k8s.go 608: Cleaning up netns ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.447 [INFO][2383] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" iface="eth0" netns="/var/run/netns/cni-0ccc2e52-299b-50e4-ff74-f0aaf2a3079e" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.447 [INFO][2383] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" iface="eth0" netns="/var/run/netns/cni-0ccc2e52-299b-50e4-ff74-f0aaf2a3079e" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.447 [INFO][2383] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" iface="eth0" netns="/var/run/netns/cni-0ccc2e52-299b-50e4-ff74-f0aaf2a3079e" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.447 [INFO][2383] k8s.go 615: Releasing IP address(es) ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.447 [INFO][2383] utils.go 188: Calico CNI releasing IP address ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.530 [INFO][2389] ipam_plugin.go 411: Releasing address using handleID ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.533 [INFO][2389] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.533 [INFO][2389] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.542 [WARNING][2389] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.542 [INFO][2389] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.545 [INFO][2389] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:59:36.554969 env[1140]: 2024-07-02 08:59:36.546 [INFO][2383] k8s.go 621: Teardown processing complete. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 08:59:36.557452 systemd[1]: run-netns-cni\x2d0ccc2e52\x2d299b\x2d50e4\x2dff74\x2df0aaf2a3079e.mount: Deactivated successfully. Jul 2 08:59:36.560675 env[1140]: time="2024-07-02T08:59:36.560627072Z" level=info msg="TearDown network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\" successfully" Jul 2 08:59:36.560775 env[1140]: time="2024-07-02T08:59:36.560670841Z" level=info msg="StopPodSandbox for \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\" returns successfully" Jul 2 08:59:36.578734 env[1140]: time="2024-07-02T08:59:36.578694321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-27bnv,Uid:9771cf57-545a-4bc6-9c54-0f209c12eec3,Namespace:calico-system,Attempt:1,}" Jul 2 08:59:36.653009 systemd-networkd[977]: cali6ff862bd332: Gained IPv6LL Jul 2 08:59:36.827366 systemd-networkd[977]: cali9b1ccc395b9: Link UP Jul 2 08:59:36.829979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:59:36.830013 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9b1ccc395b9: link becomes ready Jul 2 08:59:36.831280 systemd-networkd[977]: cali9b1ccc395b9: Gained carrier Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.686 [INFO][2395] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.73-k8s-csi--node--driver--27bnv-eth0 csi-node-driver- calico-system 9771cf57-545a-4bc6-9c54-0f209c12eec3 1216 0 2024-07-02 08:59:01 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.73 csi-node-driver-27bnv eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9b1ccc395b9 [] []}} ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.686 [INFO][2395] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.752 [INFO][2407] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" HandleID="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.778 [INFO][2407] ipam_plugin.go 264: Auto assigning IP ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" HandleID="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e7cc0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.73", "pod":"csi-node-driver-27bnv", "timestamp":"2024-07-02 08:59:36.749280154 +0000 UTC"}, Hostname:"172.24.4.73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.779 [INFO][2407] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.779 [INFO][2407] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.779 [INFO][2407] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.73' Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.781 [INFO][2407] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.791 [INFO][2407] ipam.go 372: Looking up existing affinities for host host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.801 [INFO][2407] ipam.go 489: Trying affinity for 192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.803 [INFO][2407] ipam.go 155: Attempting to load block cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.807 [INFO][2407] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.807 [INFO][2407] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.64/26 handle="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.809 [INFO][2407] ipam.go 1685: Creating new handle: k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73 Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.815 [INFO][2407] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.64/26 handle="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.821 [INFO][2407] ipam.go 1216: Successfully claimed IPs: [192.168.8.66/26] block=192.168.8.64/26 handle="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.821 [INFO][2407] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.66/26] handle="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" host="172.24.4.73" Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.821 [INFO][2407] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:59:36.856642 env[1140]: 2024-07-02 08:59:36.821 [INFO][2407] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.8.66/26] IPv6=[] ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" HandleID="k8s-pod-network.b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.857407 env[1140]: 2024-07-02 08:59:36.823 [INFO][2395] k8s.go 386: Populated endpoint ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-csi--node--driver--27bnv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9771cf57-545a-4bc6-9c54-0f209c12eec3", ResourceVersion:"1216", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"", Pod:"csi-node-driver-27bnv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9b1ccc395b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:59:36.857407 env[1140]: 2024-07-02 08:59:36.823 [INFO][2395] k8s.go 387: Calico CNI using IPs: [192.168.8.66/32] ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.857407 env[1140]: 2024-07-02 08:59:36.823 [INFO][2395] dataplane_linux.go 68: Setting the host side veth name to cali9b1ccc395b9 ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.857407 env[1140]: 2024-07-02 08:59:36.831 [INFO][2395] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.857407 env[1140]: 2024-07-02 08:59:36.832 [INFO][2395] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-csi--node--driver--27bnv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9771cf57-545a-4bc6-9c54-0f209c12eec3", ResourceVersion:"1216", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73", Pod:"csi-node-driver-27bnv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9b1ccc395b9", MAC:"4e:5d:11:5c:32:41", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:59:36.857407 env[1140]: 2024-07-02 08:59:36.842 [INFO][2395] k8s.go 500: Wrote updated endpoint to datastore ContainerID="b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73" Namespace="calico-system" Pod="csi-node-driver-27bnv" WorkloadEndpoint="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 08:59:36.871000 audit[2422]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:36.873999 kernel: kauditd_printk_skb: 217 callbacks suppressed Jul 2 08:59:36.874112 kernel: audit: type=1325 audit(1719910776.871:576): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:36.871000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffee0530900 a2=0 a3=7ffee05308ec items=0 ppid=2101 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:36.882941 kernel: audit: type=1300 audit(1719910776.871:576): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffee0530900 a2=0 a3=7ffee05308ec items=0 ppid=2101 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:36.883020 kernel: audit: type=1327 audit(1719910776.871:576): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:36.871000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:36.939699 env[1140]: time="2024-07-02T08:59:36.934844412Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:59:36.939699 env[1140]: time="2024-07-02T08:59:36.934879113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:59:36.939699 env[1140]: time="2024-07-02T08:59:36.934892189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:59:36.939699 env[1140]: time="2024-07-02T08:59:36.935016485Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73 pid=2436 runtime=io.containerd.runc.v2 Jul 2 08:59:36.950980 kubelet[1423]: E0702 08:59:36.950939 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:36.981494 systemd[1]: Started cri-containerd-b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73.scope. Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.018732 kernel: audit: type=1400 audit(1719910777.008:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.018916 kernel: audit: type=1400 audit(1719910777.008:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023882 kernel: audit: type=1400 audit(1719910777.008:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.030204 kernel: audit: type=1400 audit(1719910777.008:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.037959 kernel: audit: type=1400 audit(1719910777.008:581): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.042843 kernel: audit: type=1400 audit(1719910777.008:582): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.010000 audit: BPF prog-id=86 op=LOAD Jul 2 08:59:37.046861 kernel: audit: type=1400 audit(1719910777.008:583): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2436 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343830346238363162633764303861646465323832663132303535 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2436 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343830346238363162633764303861646465323832663132303535 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.019000 audit: BPF prog-id=87 op=LOAD Jul 2 08:59:37.019000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8850 items=0 ppid=2436 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343830346238363162633764303861646465323832663132303535 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit: BPF prog-id=88 op=LOAD Jul 2 08:59:37.023000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c8898 items=0 ppid=2436 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:37.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343830346238363162633764303861646465323832663132303535 Jul 2 08:59:37.023000 audit: BPF prog-id=88 op=UNLOAD Jul 2 08:59:37.023000 audit: BPF prog-id=87 op=UNLOAD Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:37.023000 audit: BPF prog-id=89 op=LOAD Jul 2 08:59:37.023000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8ca8 items=0 ppid=2436 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:37.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343830346238363162633764303861646465323832663132303535 Jul 2 08:59:37.115914 env[1140]: time="2024-07-02T08:59:37.115690134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-27bnv,Uid:9771cf57-545a-4bc6-9c54-0f209c12eec3,Namespace:calico-system,Attempt:1,} returns sandbox id \"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73\"" Jul 2 08:59:37.951315 kubelet[1423]: E0702 08:59:37.951248 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:38.527017 systemd-networkd[977]: cali9b1ccc395b9: Gained IPv6LL Jul 2 08:59:38.952377 kubelet[1423]: E0702 08:59:38.952180 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:39.735980 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3691467375.mount: Deactivated successfully. Jul 2 08:59:39.952787 kubelet[1423]: E0702 08:59:39.952735 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:40.914572 kubelet[1423]: E0702 08:59:40.914499 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:40.953950 kubelet[1423]: E0702 08:59:40.953875 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:41.954466 kubelet[1423]: E0702 08:59:41.954307 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:42.511195 env[1140]: time="2024-07-02T08:59:42.511113186Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:42.515127 env[1140]: time="2024-07-02T08:59:42.515068132Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:42.521738 env[1140]: time="2024-07-02T08:59:42.521639098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:42.527197 env[1140]: time="2024-07-02T08:59:42.527133351Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:42.533977 env[1140]: time="2024-07-02T08:59:42.530948944Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 08:59:42.538876 env[1140]: time="2024-07-02T08:59:42.536726903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 08:59:42.548510 env[1140]: time="2024-07-02T08:59:42.548102085Z" level=info msg="CreateContainer within sandbox \"c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 08:59:42.584330 env[1140]: time="2024-07-02T08:59:42.584252234Z" level=info msg="CreateContainer within sandbox \"c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f96075a8c935cf540ae6f0bf47efe19d769a26e6784e01d33decdf86792145e0\"" Jul 2 08:59:42.586329 env[1140]: time="2024-07-02T08:59:42.586280845Z" level=info msg="StartContainer for \"f96075a8c935cf540ae6f0bf47efe19d769a26e6784e01d33decdf86792145e0\"" Jul 2 08:59:42.621968 systemd[1]: Started cri-containerd-f96075a8c935cf540ae6f0bf47efe19d769a26e6784e01d33decdf86792145e0.scope. Jul 2 08:59:42.656043 kernel: kauditd_printk_skb: 50 callbacks suppressed Jul 2 08:59:42.656302 kernel: audit: type=1400 audit(1719910782.650:595): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.656374 kernel: audit: type=1400 audit(1719910782.650:596): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.658717 kernel: audit: type=1400 audit(1719910782.650:597): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.669709 kernel: audit: type=1400 audit(1719910782.650:598): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.669862 kernel: audit: type=1400 audit(1719910782.650:599): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.669935 kernel: audit: type=1400 audit(1719910782.650:600): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.673540 kernel: audit: type=1400 audit(1719910782.650:601): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.676751 kernel: audit: type=1400 audit(1719910782.650:602): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.680461 kernel: audit: type=1400 audit(1719910782.650:603): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.655000 audit: BPF prog-id=90 op=LOAD Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.688110 kernel: audit: type=1400 audit(1719910782.655:604): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2335 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:42.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363037356138633933356366353430616536663062663437656665 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2335 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:42.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363037356138633933356366353430616536663062663437656665 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit: BPF prog-id=91 op=LOAD Jul 2 08:59:42.661000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027b760 items=0 ppid=2335 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:42.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363037356138633933356366353430616536663062663437656665 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit: BPF prog-id=92 op=LOAD Jul 2 08:59:42.661000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027b7a8 items=0 ppid=2335 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:42.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363037356138633933356366353430616536663062663437656665 Jul 2 08:59:42.661000 audit: BPF prog-id=92 op=UNLOAD Jul 2 08:59:42.661000 audit: BPF prog-id=91 op=UNLOAD Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:42.661000 audit: BPF prog-id=93 op=LOAD Jul 2 08:59:42.661000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00027bbb8 items=0 ppid=2335 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:42.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363037356138633933356366353430616536663062663437656665 Jul 2 08:59:42.713303 env[1140]: time="2024-07-02T08:59:42.713224028Z" level=info msg="StartContainer for \"f96075a8c935cf540ae6f0bf47efe19d769a26e6784e01d33decdf86792145e0\" returns successfully" Jul 2 08:59:42.955306 kubelet[1423]: E0702 08:59:42.955122 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:43.574778 kubelet[1423]: I0702 08:59:43.574692 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-mwmlm" podStartSLOduration=14.035229811 podStartE2EDuration="21.574652847s" podCreationTimestamp="2024-07-02 08:59:22 +0000 UTC" firstStartedPulling="2024-07-02 08:59:34.995122717 +0000 UTC m=+35.344330965" lastFinishedPulling="2024-07-02 08:59:42.534545713 +0000 UTC m=+42.883754001" observedRunningTime="2024-07-02 08:59:43.571738167 +0000 UTC m=+43.920946475" watchObservedRunningTime="2024-07-02 08:59:43.574652847 +0000 UTC m=+43.923861085" Jul 2 08:59:43.956900 kubelet[1423]: E0702 08:59:43.956287 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:44.527961 env[1140]: time="2024-07-02T08:59:44.527788374Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:44.531381 env[1140]: time="2024-07-02T08:59:44.531311555Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:44.533713 env[1140]: time="2024-07-02T08:59:44.533654140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:44.535985 env[1140]: time="2024-07-02T08:59:44.535928537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:44.536847 env[1140]: time="2024-07-02T08:59:44.536784687Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 08:59:44.543755 env[1140]: time="2024-07-02T08:59:44.543704173Z" level=info msg="CreateContainer within sandbox \"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 08:59:44.577027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1142036455.mount: Deactivated successfully. Jul 2 08:59:44.579381 env[1140]: time="2024-07-02T08:59:44.579341473Z" level=info msg="CreateContainer within sandbox \"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"07c859060bb7bf1f27b98f0d02bc93b4bdadcfbb401d7f6e8400d81e9f163142\"" Jul 2 08:59:44.580695 env[1140]: time="2024-07-02T08:59:44.580497129Z" level=info msg="StartContainer for \"07c859060bb7bf1f27b98f0d02bc93b4bdadcfbb401d7f6e8400d81e9f163142\"" Jul 2 08:59:44.642752 systemd[1]: Started cri-containerd-07c859060bb7bf1f27b98f0d02bc93b4bdadcfbb401d7f6e8400d81e9f163142.scope. Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5ea09ca2f8 items=0 ppid=2436 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:44.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633835393036306262376266316632376239386630643032626339 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.666000 audit: BPF prog-id=94 op=LOAD Jul 2 08:59:44.666000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024558 items=0 ppid=2436 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:44.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633835393036306262376266316632376239386630643032626339 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.667000 audit: BPF prog-id=95 op=LOAD Jul 2 08:59:44.667000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000245a8 items=0 ppid=2436 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:44.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633835393036306262376266316632376239386630643032626339 Jul 2 08:59:44.668000 audit: BPF prog-id=95 op=UNLOAD Jul 2 08:59:44.668000 audit: BPF prog-id=94 op=UNLOAD Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:44.668000 audit: BPF prog-id=96 op=LOAD Jul 2 08:59:44.668000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024638 items=0 ppid=2436 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:44.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633835393036306262376266316632376239386630643032626339 Jul 2 08:59:44.703548 env[1140]: time="2024-07-02T08:59:44.703436934Z" level=info msg="StartContainer for \"07c859060bb7bf1f27b98f0d02bc93b4bdadcfbb401d7f6e8400d81e9f163142\" returns successfully" Jul 2 08:59:44.706048 env[1140]: time="2024-07-02T08:59:44.706005926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 08:59:44.957122 kubelet[1423]: E0702 08:59:44.956794 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:45.959019 kubelet[1423]: E0702 08:59:45.958902 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:46.679743 env[1140]: time="2024-07-02T08:59:46.679678668Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:46.682963 env[1140]: time="2024-07-02T08:59:46.682924012Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:46.685247 env[1140]: time="2024-07-02T08:59:46.685216425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:46.688045 env[1140]: time="2024-07-02T08:59:46.688011712Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 08:59:46.689062 env[1140]: time="2024-07-02T08:59:46.689020727Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 08:59:46.694670 env[1140]: time="2024-07-02T08:59:46.694591931Z" level=info msg="CreateContainer within sandbox \"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 08:59:46.717404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount726782876.mount: Deactivated successfully. Jul 2 08:59:46.727464 env[1140]: time="2024-07-02T08:59:46.727419759Z" level=info msg="CreateContainer within sandbox \"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1d3a5cfaf98e45ead50d6c9a5fdaaa058b82ea50e61ce04f4ff146dee1e0db9e\"" Jul 2 08:59:46.728324 env[1140]: time="2024-07-02T08:59:46.728300074Z" level=info msg="StartContainer for \"1d3a5cfaf98e45ead50d6c9a5fdaaa058b82ea50e61ce04f4ff146dee1e0db9e\"" Jul 2 08:59:46.790723 systemd[1]: Started cri-containerd-1d3a5cfaf98e45ead50d6c9a5fdaaa058b82ea50e61ce04f4ff146dee1e0db9e.scope. Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5dd13af718 items=0 ppid=2436 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:46.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336135636661663938653435656164353064366339613566646161 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.823000 audit: BPF prog-id=97 op=LOAD Jul 2 08:59:46.823000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000226a48 items=0 ppid=2436 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:46.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336135636661663938653435656164353064366339613566646161 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.824000 audit: BPF prog-id=98 op=LOAD Jul 2 08:59:46.824000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000226a98 items=0 ppid=2436 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:46.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336135636661663938653435656164353064366339613566646161 Jul 2 08:59:46.825000 audit: BPF prog-id=98 op=UNLOAD Jul 2 08:59:46.825000 audit: BPF prog-id=97 op=UNLOAD Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:46.825000 audit: BPF prog-id=99 op=LOAD Jul 2 08:59:46.825000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000226b28 items=0 ppid=2436 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336135636661663938653435656164353064366339613566646161 Jul 2 08:59:46.975300 kubelet[1423]: E0702 08:59:46.960390 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:47.029489 env[1140]: time="2024-07-02T08:59:47.029343935Z" level=info msg="StartContainer for \"1d3a5cfaf98e45ead50d6c9a5fdaaa058b82ea50e61ce04f4ff146dee1e0db9e\" returns successfully" Jul 2 08:59:47.229112 kubelet[1423]: I0702 08:59:47.228896 1423 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 08:59:47.540283 kubelet[1423]: I0702 08:59:47.540016 1423 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 08:59:47.601205 kubelet[1423]: I0702 08:59:47.601069 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-27bnv" podStartSLOduration=37.107101103 podStartE2EDuration="46.600959821s" podCreationTimestamp="2024-07-02 08:59:01 +0000 UTC" firstStartedPulling="2024-07-02 08:59:37.196345685 +0000 UTC m=+37.545553934" lastFinishedPulling="2024-07-02 08:59:46.690204363 +0000 UTC m=+47.039412652" observedRunningTime="2024-07-02 08:59:47.600570447 +0000 UTC m=+47.949778725" watchObservedRunningTime="2024-07-02 08:59:47.600959821 +0000 UTC m=+47.950168099" Jul 2 08:59:47.717114 systemd[1]: run-containerd-runc-k8s.io-1d3a5cfaf98e45ead50d6c9a5fdaaa058b82ea50e61ce04f4ff146dee1e0db9e-runc.4P7RmM.mount: Deactivated successfully. Jul 2 08:59:47.961766 kubelet[1423]: E0702 08:59:47.961598 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:48.962313 kubelet[1423]: E0702 08:59:48.962255 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:49.963299 kubelet[1423]: E0702 08:59:49.963068 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:50.963890 kubelet[1423]: E0702 08:59:50.963776 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:51.965504 kubelet[1423]: E0702 08:59:51.965415 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:52.967031 kubelet[1423]: E0702 08:59:52.966922 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:53.968100 kubelet[1423]: E0702 08:59:53.967996 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:54.804000 audit[2632]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.809188 kernel: kauditd_printk_skb: 133 callbacks suppressed Jul 2 08:59:54.809520 kernel: audit: type=1325 audit(1719910794.804:625): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.804000 audit[2632]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcb366a160 a2=0 a3=7ffcb366a14c items=0 ppid=1642 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:54.831748 kernel: audit: type=1300 audit(1719910794.804:625): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcb366a160 a2=0 a3=7ffcb366a14c items=0 ppid=1642 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:54.832144 kernel: audit: type=1327 audit(1719910794.804:625): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:54.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:54.804000 audit[2632]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.848871 kernel: audit: type=1325 audit(1719910794.804:626): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.804000 audit[2632]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcb366a160 a2=0 a3=0 items=0 ppid=1642 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:54.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:54.859518 kernel: audit: type=1300 audit(1719910794.804:626): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcb366a160 a2=0 a3=0 items=0 ppid=1642 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:54.859604 kernel: audit: type=1327 audit(1719910794.804:626): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:54.857000 audit[2636]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.862885 kernel: audit: type=1325 audit(1719910794.857:627): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.863016 kernel: audit: type=1300 audit(1719910794.857:627): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff1aa183f0 a2=0 a3=7fff1aa183dc items=0 ppid=1642 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:54.857000 audit[2636]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff1aa183f0 a2=0 a3=7fff1aa183dc items=0 ppid=1642 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:54.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:54.871269 kernel: audit: type=1327 audit(1719910794.857:627): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:54.858000 audit[2636]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.874082 kernel: audit: type=1325 audit(1719910794.858:628): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 08:59:54.858000 audit[2636]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff1aa183f0 a2=0 a3=0 items=0 ppid=1642 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:54.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 08:59:54.896746 kubelet[1423]: I0702 08:59:54.896608 1423 topology_manager.go:215] "Topology Admit Handler" podUID="c9de5019-d3e6-4e0b-9f34-88f34d9f3936" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 08:59:54.915665 systemd[1]: Created slice kubepods-besteffort-podc9de5019_d3e6_4e0b_9f34_88f34d9f3936.slice. Jul 2 08:59:54.968709 kubelet[1423]: E0702 08:59:54.968650 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:55.001587 kubelet[1423]: I0702 08:59:55.001524 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c9de5019-d3e6-4e0b-9f34-88f34d9f3936-data\") pod \"nfs-server-provisioner-0\" (UID: \"c9de5019-d3e6-4e0b-9f34-88f34d9f3936\") " pod="default/nfs-server-provisioner-0" Jul 2 08:59:55.001964 kubelet[1423]: I0702 08:59:55.001671 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6z7d6\" (UniqueName: \"kubernetes.io/projected/c9de5019-d3e6-4e0b-9f34-88f34d9f3936-kube-api-access-6z7d6\") pod \"nfs-server-provisioner-0\" (UID: \"c9de5019-d3e6-4e0b-9f34-88f34d9f3936\") " pod="default/nfs-server-provisioner-0" Jul 2 08:59:55.226633 env[1140]: time="2024-07-02T08:59:55.225211763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c9de5019-d3e6-4e0b-9f34-88f34d9f3936,Namespace:default,Attempt:0,}" Jul 2 08:59:55.612029 systemd-networkd[977]: cali60e51b789ff: Link UP Jul 2 08:59:55.619228 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 08:59:55.619480 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 08:59:55.620995 systemd-networkd[977]: cali60e51b789ff: Gained carrier Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.400 [INFO][2638] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.73-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c9de5019-d3e6-4e0b-9f34-88f34d9f3936 1290 0 2024-07-02 08:59:54 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.73 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.401 [INFO][2638] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.493 [INFO][2650] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" HandleID="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Workload="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.522 [INFO][2650] ipam_plugin.go 264: Auto assigning IP ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" HandleID="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Workload="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004f35e0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.73", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 08:59:55.493888381 +0000 UTC"}, Hostname:"172.24.4.73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.523 [INFO][2650] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.523 [INFO][2650] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.523 [INFO][2650] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.73' Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.529 [INFO][2650] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.538 [INFO][2650] ipam.go 372: Looking up existing affinities for host host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.549 [INFO][2650] ipam.go 489: Trying affinity for 192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.559 [INFO][2650] ipam.go 155: Attempting to load block cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.566 [INFO][2650] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.566 [INFO][2650] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.64/26 handle="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.571 [INFO][2650] ipam.go 1685: Creating new handle: k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595 Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.581 [INFO][2650] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.64/26 handle="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.593 [INFO][2650] ipam.go 1216: Successfully claimed IPs: [192.168.8.67/26] block=192.168.8.64/26 handle="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.593 [INFO][2650] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.67/26] handle="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" host="172.24.4.73" Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.594 [INFO][2650] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 08:59:55.647952 env[1140]: 2024-07-02 08:59:55.594 [INFO][2650] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.8.67/26] IPv6=[] ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" HandleID="k8s-pod-network.3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Workload="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:59:55.654093 env[1140]: 2024-07-02 08:59:55.599 [INFO][2638] k8s.go 386: Populated endpoint ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c9de5019-d3e6-4e0b-9f34-88f34d9f3936", ResourceVersion:"1290", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:59:55.654093 env[1140]: 2024-07-02 08:59:55.599 [INFO][2638] k8s.go 387: Calico CNI using IPs: [192.168.8.67/32] ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:59:55.654093 env[1140]: 2024-07-02 08:59:55.600 [INFO][2638] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:59:55.654093 env[1140]: 2024-07-02 08:59:55.623 [INFO][2638] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:59:55.655631 env[1140]: 2024-07-02 08:59:55.624 [INFO][2638] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c9de5019-d3e6-4e0b-9f34-88f34d9f3936", ResourceVersion:"1290", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e2:52:75:26:e1:05", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 08:59:55.655631 env[1140]: 2024-07-02 08:59:55.644 [INFO][2638] k8s.go 500: Wrote updated endpoint to datastore ContainerID="3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.73-k8s-nfs--server--provisioner--0-eth0" Jul 2 08:59:55.695890 env[1140]: time="2024-07-02T08:59:55.695782401Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 08:59:55.696103 env[1140]: time="2024-07-02T08:59:55.695854996Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 08:59:55.696103 env[1140]: time="2024-07-02T08:59:55.695870206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 08:59:55.696405 env[1140]: time="2024-07-02T08:59:55.696363524Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595 pid=2680 runtime=io.containerd.runc.v2 Jul 2 08:59:55.695000 audit[2675]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 08:59:55.695000 audit[2675]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffd989ccab0 a2=0 a3=7ffd989cca9c items=0 ppid=2101 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:55.695000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 08:59:55.719983 systemd[1]: Started cri-containerd-3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595.scope. Jul 2 08:59:55.730100 systemd[1]: run-containerd-runc-k8s.io-3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595-runc.lHl8KH.mount: Deactivated successfully. Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.754000 audit: BPF prog-id=100 op=LOAD Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:55.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364636538333636353264336234643830613036333139626133326362 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:55.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364636538333636353264336234643830613036333139626133326362 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.756000 audit: BPF prog-id=101 op=LOAD Jul 2 08:59:55.756000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0002e6870 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:55.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364636538333636353264336234643830613036333139626133326362 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.758000 audit: BPF prog-id=102 op=LOAD Jul 2 08:59:55.758000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0002e68b8 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:55.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364636538333636353264336234643830613036333139626133326362 Jul 2 08:59:55.759000 audit: BPF prog-id=102 op=UNLOAD Jul 2 08:59:55.759000 audit: BPF prog-id=101 op=UNLOAD Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 08:59:55.759000 audit: BPF prog-id=103 op=LOAD Jul 2 08:59:55.759000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0002e6cc8 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 08:59:55.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364636538333636353264336234643830613036333139626133326362 Jul 2 08:59:55.797627 env[1140]: time="2024-07-02T08:59:55.797554843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c9de5019-d3e6-4e0b-9f34-88f34d9f3936,Namespace:default,Attempt:0,} returns sandbox id \"3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595\"" Jul 2 08:59:55.799731 env[1140]: time="2024-07-02T08:59:55.799704656Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 08:59:55.970593 kubelet[1423]: E0702 08:59:55.970458 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:56.258632 systemd[1]: run-containerd-runc-k8s.io-e6f7f5a38e72b34cf4a5b908a51022c762f0e28ced705ef1774f97fb7d420829-runc.mxQ6vL.mount: Deactivated successfully. Jul 2 08:59:56.971171 kubelet[1423]: E0702 08:59:56.971128 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:57.376066 systemd-networkd[977]: cali60e51b789ff: Gained IPv6LL Jul 2 08:59:57.972584 kubelet[1423]: E0702 08:59:57.972467 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:58.973176 kubelet[1423]: E0702 08:59:58.973126 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 08:59:59.973778 kubelet[1423]: E0702 08:59:59.973696 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:00.009573 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2350319235.mount: Deactivated successfully. Jul 2 09:00:00.914223 kubelet[1423]: E0702 09:00:00.914158 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:00.974956 kubelet[1423]: E0702 09:00:00.974877 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:01.093247 env[1140]: time="2024-07-02T09:00:01.093157049Z" level=info msg="StopPodSandbox for \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\"" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.446 [WARNING][2754] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f", ResourceVersion:"1237", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025", Pod:"nginx-deployment-6d5f899847-mwmlm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6ff862bd332", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.447 [INFO][2754] k8s.go 608: Cleaning up netns ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.447 [INFO][2754] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" iface="eth0" netns="" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.447 [INFO][2754] k8s.go 615: Releasing IP address(es) ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.447 [INFO][2754] utils.go 188: Calico CNI releasing IP address ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.527 [INFO][2763] ipam_plugin.go 411: Releasing address using handleID ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.527 [INFO][2763] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.528 [INFO][2763] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.732 [WARNING][2763] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.732 [INFO][2763] ipam_plugin.go 439: Releasing address using workloadID ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.736 [INFO][2763] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 09:00:01.740927 env[1140]: 2024-07-02 09:00:01.738 [INFO][2754] k8s.go 621: Teardown processing complete. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:01.742320 env[1140]: time="2024-07-02T09:00:01.742238554Z" level=info msg="TearDown network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\" successfully" Jul 2 09:00:01.742505 env[1140]: time="2024-07-02T09:00:01.742460869Z" level=info msg="StopPodSandbox for \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\" returns successfully" Jul 2 09:00:01.744157 env[1140]: time="2024-07-02T09:00:01.744092010Z" level=info msg="RemovePodSandbox for \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\"" Jul 2 09:00:01.744626 env[1140]: time="2024-07-02T09:00:01.744535760Z" level=info msg="Forcibly stopping sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\"" Jul 2 09:00:01.976170 kubelet[1423]: E0702 09:00:01.976057 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.044 [WARNING][2784] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"62e4d6b5-ed2d-4ed6-ab9b-36a4b863154f", ResourceVersion:"1237", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"c3dbb994001778f159e57324bfa5f84ab78cf5c13ce644a0f4cd76df314e7025", Pod:"nginx-deployment-6d5f899847-mwmlm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6ff862bd332", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.045 [INFO][2784] k8s.go 608: Cleaning up netns ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.045 [INFO][2784] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" iface="eth0" netns="" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.045 [INFO][2784] k8s.go 615: Releasing IP address(es) ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.045 [INFO][2784] utils.go 188: Calico CNI releasing IP address ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.104 [INFO][2790] ipam_plugin.go 411: Releasing address using handleID ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.105 [INFO][2790] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.105 [INFO][2790] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.113 [WARNING][2790] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.113 [INFO][2790] ipam_plugin.go 439: Releasing address using workloadID ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" HandleID="k8s-pod-network.667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Workload="172.24.4.73-k8s-nginx--deployment--6d5f899847--mwmlm-eth0" Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.115 [INFO][2790] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 09:00:02.117829 env[1140]: 2024-07-02 09:00:02.116 [INFO][2784] k8s.go 621: Teardown processing complete. ContainerID="667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10" Jul 2 09:00:02.118861 env[1140]: time="2024-07-02T09:00:02.118798230Z" level=info msg="TearDown network for sandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\" successfully" Jul 2 09:00:02.124274 env[1140]: time="2024-07-02T09:00:02.124237145Z" level=info msg="RemovePodSandbox \"667ac64208fee58e644ffa95c3e1dfb88b07f7aa85ed61cdbe4c874145674a10\" returns successfully" Jul 2 09:00:02.125115 env[1140]: time="2024-07-02T09:00:02.125090501Z" level=info msg="StopPodSandbox for \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\"" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.229 [WARNING][2811] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-csi--node--driver--27bnv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9771cf57-545a-4bc6-9c54-0f209c12eec3", ResourceVersion:"1256", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73", Pod:"csi-node-driver-27bnv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9b1ccc395b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.229 [INFO][2811] k8s.go 608: Cleaning up netns ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.229 [INFO][2811] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" iface="eth0" netns="" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.229 [INFO][2811] k8s.go 615: Releasing IP address(es) ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.229 [INFO][2811] utils.go 188: Calico CNI releasing IP address ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.255 [INFO][2817] ipam_plugin.go 411: Releasing address using handleID ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.256 [INFO][2817] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.256 [INFO][2817] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.264 [WARNING][2817] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.264 [INFO][2817] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.266 [INFO][2817] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 09:00:02.269053 env[1140]: 2024-07-02 09:00:02.267 [INFO][2811] k8s.go 621: Teardown processing complete. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.269628 env[1140]: time="2024-07-02T09:00:02.269084756Z" level=info msg="TearDown network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\" successfully" Jul 2 09:00:02.269628 env[1140]: time="2024-07-02T09:00:02.269135253Z" level=info msg="StopPodSandbox for \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\" returns successfully" Jul 2 09:00:02.269938 env[1140]: time="2024-07-02T09:00:02.269900186Z" level=info msg="RemovePodSandbox for \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\"" Jul 2 09:00:02.270000 env[1140]: time="2024-07-02T09:00:02.269944223Z" level=info msg="Forcibly stopping sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\"" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.334 [WARNING][2838] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-csi--node--driver--27bnv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9771cf57-545a-4bc6-9c54-0f209c12eec3", ResourceVersion:"1256", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"b44804b861bc7d08adde282f12055cd3eb4bcc4a75d8dc67808122312516bf73", Pod:"csi-node-driver-27bnv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9b1ccc395b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.334 [INFO][2838] k8s.go 608: Cleaning up netns ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.334 [INFO][2838] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" iface="eth0" netns="" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.334 [INFO][2838] k8s.go 615: Releasing IP address(es) ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.334 [INFO][2838] utils.go 188: Calico CNI releasing IP address ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.371 [INFO][2844] ipam_plugin.go 411: Releasing address using handleID ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.372 [INFO][2844] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.372 [INFO][2844] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.382 [WARNING][2844] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.383 [INFO][2844] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" HandleID="k8s-pod-network.e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Workload="172.24.4.73-k8s-csi--node--driver--27bnv-eth0" Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.385 [INFO][2844] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 09:00:02.388296 env[1140]: 2024-07-02 09:00:02.386 [INFO][2838] k8s.go 621: Teardown processing complete. ContainerID="e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083" Jul 2 09:00:02.389461 env[1140]: time="2024-07-02T09:00:02.388272011Z" level=info msg="TearDown network for sandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\" successfully" Jul 2 09:00:02.392381 env[1140]: time="2024-07-02T09:00:02.392341270Z" level=info msg="RemovePodSandbox \"e68f1f8fbd88d38f3fb7e2cca35ee3c30ce374f8059af69c1fa4cf3b7bd44083\" returns successfully" Jul 2 09:00:02.976544 kubelet[1423]: E0702 09:00:02.976468 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:03.846543 env[1140]: time="2024-07-02T09:00:03.846388779Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:03.945936 env[1140]: time="2024-07-02T09:00:03.945794040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:03.950570 env[1140]: time="2024-07-02T09:00:03.950500220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:03.954746 env[1140]: time="2024-07-02T09:00:03.954645951Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:03.957360 env[1140]: time="2024-07-02T09:00:03.957280858Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 2 09:00:03.966610 env[1140]: time="2024-07-02T09:00:03.966536725Z" level=info msg="CreateContainer within sandbox \"3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 09:00:03.977794 kubelet[1423]: E0702 09:00:03.977642 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:03.999478 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2591283164.mount: Deactivated successfully. Jul 2 09:00:04.009044 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1210700938.mount: Deactivated successfully. Jul 2 09:00:04.021087 env[1140]: time="2024-07-02T09:00:04.020978753Z" level=info msg="CreateContainer within sandbox \"3dce836652d3b4d80a06319ba32cb14aff2d4e464ec3f4bc9c31be1a71d94595\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"2a5760007dcf99d9a186d013d5310817b5348b040f388830d7c2f6fc325a0fa6\"" Jul 2 09:00:04.022999 env[1140]: time="2024-07-02T09:00:04.022833358Z" level=info msg="StartContainer for \"2a5760007dcf99d9a186d013d5310817b5348b040f388830d7c2f6fc325a0fa6\"" Jul 2 09:00:04.073942 systemd[1]: Started cri-containerd-2a5760007dcf99d9a186d013d5310817b5348b040f388830d7c2f6fc325a0fa6.scope. Jul 2 09:00:04.096411 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 09:00:04.096907 kernel: audit: type=1400 audit(1719910804.088:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.096969 kernel: audit: type=1400 audit(1719910804.088:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097055 kernel: audit: type=1400 audit(1719910804.088:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.100278 kernel: audit: type=1400 audit(1719910804.088:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.106767 kernel: audit: type=1400 audit(1719910804.088:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.106906 kernel: audit: type=1400 audit(1719910804.088:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.110187 kernel: audit: type=1400 audit(1719910804.088:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.113666 kernel: audit: type=1400 audit(1719910804.088:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.121941 kernel: audit: type=1400 audit(1719910804.088:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.096000 audit: BPF prog-id=104 op=LOAD Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2680 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:04.134055 kernel: audit: type=1400 audit(1719910804.096:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353736303030376463663939643961313836643031336435333130 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2680 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353736303030376463663939643961313836643031336435333130 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.097000 audit: BPF prog-id=105 op=LOAD Jul 2 09:00:04.097000 audit[2862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000385840 items=0 ppid=2680 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:04.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353736303030376463663939643961313836643031336435333130 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.099000 audit: BPF prog-id=106 op=LOAD Jul 2 09:00:04.099000 audit[2862]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000385888 items=0 ppid=2680 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:04.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353736303030376463663939643961313836643031336435333130 Jul 2 09:00:04.102000 audit: BPF prog-id=106 op=UNLOAD Jul 2 09:00:04.102000 audit: BPF prog-id=105 op=UNLOAD Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { perfmon } for pid=2862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit[2862]: AVC avc: denied { bpf } for pid=2862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:04.102000 audit: BPF prog-id=107 op=LOAD Jul 2 09:00:04.102000 audit[2862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000385c98 items=0 ppid=2680 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:04.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353736303030376463663939643961313836643031336435333130 Jul 2 09:00:04.165999 env[1140]: time="2024-07-02T09:00:04.165943940Z" level=info msg="StartContainer for \"2a5760007dcf99d9a186d013d5310817b5348b040f388830d7c2f6fc325a0fa6\" returns successfully" Jul 2 09:00:04.196000 audit[2892]: AVC avc: denied { search } for pid=2892 comm="rpcbind" name="crypto" dev="proc" ino=22302 scontext=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 09:00:04.196000 audit[2892]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdf5664e0c0 a2=0 a3=0 items=0 ppid=2872 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 key=(null) Jul 2 09:00:04.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 09:00:04.358000 audit[2897]: AVC avc: denied { search } for pid=2897 comm="dbus-daemon" name="crypto" dev="proc" ino=22302 scontext=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 09:00:04.358000 audit[2897]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f050c0eb0c0 a2=0 a3=0 items=0 ppid=2872 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 key=(null) Jul 2 09:00:04.358000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 09:00:04.373000 audit[2898]: AVC avc: denied { watch } for pid=2898 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537672 scontext=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c505,c640 tclass=dir permissive=0 Jul 2 09:00:04.373000 audit[2898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5570f98e8590 a2=2c8 a3=7ffc24ac711c items=0 ppid=2872 pid=2898 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 key=(null) Jul 2 09:00:04.373000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 09:00:04.383000 audit[2899]: AVC avc: denied { read } for pid=2899 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22564 scontext=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 09:00:04.383000 audit[2899]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2e5a4c7320 a1=80000 a2=d a3=7ffdb9850890 items=0 ppid=2872 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 key=(null) Jul 2 09:00:04.383000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 09:00:04.385000 audit[2899]: AVC avc: denied { search } for pid=2899 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22302 scontext=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 09:00:04.385000 audit[2899]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2e59a1b0c0 a2=0 a3=0 items=0 ppid=2872 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c505,c640 key=(null) Jul 2 09:00:04.385000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 09:00:04.978175 kubelet[1423]: E0702 09:00:04.978067 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:04.986523 systemd[1]: run-containerd-runc-k8s.io-2a5760007dcf99d9a186d013d5310817b5348b040f388830d7c2f6fc325a0fa6-runc.V1AA8R.mount: Deactivated successfully. Jul 2 09:00:05.062000 audit[2905]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 09:00:05.062000 audit[2905]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe520b2360 a2=0 a3=7ffe520b234c items=0 ppid=1642 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:05.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 09:00:05.069000 audit[2905]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 09:00:05.069000 audit[2905]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe520b2360 a2=0 a3=7ffe520b234c items=0 ppid=1642 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:05.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 09:00:05.979414 kubelet[1423]: E0702 09:00:05.979357 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:06.980706 kubelet[1423]: E0702 09:00:06.980589 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:07.981675 kubelet[1423]: E0702 09:00:07.981587 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:08.982428 kubelet[1423]: E0702 09:00:08.982367 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:09.983662 kubelet[1423]: E0702 09:00:09.983596 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:10.985057 kubelet[1423]: E0702 09:00:10.984911 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:11.985713 kubelet[1423]: E0702 09:00:11.985588 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:12.986011 kubelet[1423]: E0702 09:00:12.985874 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:13.986771 kubelet[1423]: E0702 09:00:13.986659 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:14.987438 kubelet[1423]: E0702 09:00:14.987329 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:15.988412 kubelet[1423]: E0702 09:00:15.988354 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:16.989453 kubelet[1423]: E0702 09:00:16.989396 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:17.991423 kubelet[1423]: E0702 09:00:17.991317 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:18.992529 kubelet[1423]: E0702 09:00:18.992464 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:19.993689 kubelet[1423]: E0702 09:00:19.993628 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:20.915065 kubelet[1423]: E0702 09:00:20.915015 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:20.994739 kubelet[1423]: E0702 09:00:20.994656 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:21.996673 kubelet[1423]: E0702 09:00:21.996555 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:22.997907 kubelet[1423]: E0702 09:00:22.997773 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:23.998859 kubelet[1423]: E0702 09:00:23.998683 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:24.999570 kubelet[1423]: E0702 09:00:24.999508 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:26.000924 kubelet[1423]: E0702 09:00:26.000861 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:26.256283 systemd[1]: run-containerd-runc-k8s.io-e6f7f5a38e72b34cf4a5b908a51022c762f0e28ced705ef1774f97fb7d420829-runc.lv4cAP.mount: Deactivated successfully. Jul 2 09:00:27.002499 kubelet[1423]: E0702 09:00:27.002391 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:28.002638 kubelet[1423]: E0702 09:00:28.002573 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:28.681253 kubelet[1423]: I0702 09:00:28.681201 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=26.52247273 podStartE2EDuration="34.681064542s" podCreationTimestamp="2024-07-02 08:59:54 +0000 UTC" firstStartedPulling="2024-07-02 08:59:55.799372832 +0000 UTC m=+56.148581080" lastFinishedPulling="2024-07-02 09:00:03.957964603 +0000 UTC m=+64.307172892" observedRunningTime="2024-07-02 09:00:04.813281088 +0000 UTC m=+65.162489376" watchObservedRunningTime="2024-07-02 09:00:28.681064542 +0000 UTC m=+89.030272830" Jul 2 09:00:28.681673 kubelet[1423]: I0702 09:00:28.681442 1423 topology_manager.go:215] "Topology Admit Handler" podUID="e265f72b-1d26-45aa-90f2-f452cccfde5a" podNamespace="default" podName="test-pod-1" Jul 2 09:00:28.697625 systemd[1]: Created slice kubepods-besteffort-pode265f72b_1d26_45aa_90f2_f452cccfde5a.slice. Jul 2 09:00:28.754109 kubelet[1423]: I0702 09:00:28.754001 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sd5nq\" (UniqueName: \"kubernetes.io/projected/e265f72b-1d26-45aa-90f2-f452cccfde5a-kube-api-access-sd5nq\") pod \"test-pod-1\" (UID: \"e265f72b-1d26-45aa-90f2-f452cccfde5a\") " pod="default/test-pod-1" Jul 2 09:00:28.754428 kubelet[1423]: I0702 09:00:28.754204 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-72f1bfba-d5d7-488f-9221-77a374f4ef00\" (UniqueName: \"kubernetes.io/nfs/e265f72b-1d26-45aa-90f2-f452cccfde5a-pvc-72f1bfba-d5d7-488f-9221-77a374f4ef00\") pod \"test-pod-1\" (UID: \"e265f72b-1d26-45aa-90f2-f452cccfde5a\") " pod="default/test-pod-1" Jul 2 09:00:28.924829 kernel: Failed to create system directory netfs Jul 2 09:00:28.925002 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 09:00:28.925035 kernel: audit: type=1400 audit(1719910828.921:673): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.921000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.930756 kernel: Failed to create system directory netfs Jul 2 09:00:28.930821 kernel: audit: type=1400 audit(1719910828.921:673): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.921000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.936796 kernel: Failed to create system directory netfs Jul 2 09:00:28.936858 kernel: audit: type=1400 audit(1719910828.921:673): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.921000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.942457 kernel: Failed to create system directory netfs Jul 2 09:00:28.942503 kernel: audit: type=1400 audit(1719910828.921:673): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.921000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.970981 kernel: audit: type=1300 audit(1719910828.921:673): arch=c000003e syscall=175 success=yes exit=0 a0=556ceaadc5e0 a1=153bc a2=556ce90f02b0 a3=5 items=0 ppid=50 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:28.921000 audit[2965]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556ceaadc5e0 a1=153bc a2=556ce90f02b0 a3=5 items=0 ppid=50 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:28.921000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 09:00:28.975913 kernel: audit: type=1327 audit(1719910828.921:673): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 09:00:28.975975 kernel: Failed to create system directory fscache Jul 2 09:00:28.984656 kernel: audit: type=1400 audit(1719910828.971:674): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.984751 kernel: Failed to create system directory fscache Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.989784 kernel: audit: type=1400 audit(1719910828.971:674): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.989849 kernel: Failed to create system directory fscache Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.994382 kernel: audit: type=1400 audit(1719910828.971:674): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.994427 kernel: Failed to create system directory fscache Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.998929 kernel: audit: type=1400 audit(1719910828.971:674): avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.998974 kernel: Failed to create system directory fscache Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.000921 kernel: Failed to create system directory fscache Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.002006 kernel: Failed to create system directory fscache Jul 2 09:00:29.002063 kernel: Failed to create system directory fscache Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.003938 kernel: Failed to create system directory fscache Jul 2 09:00:29.003993 kernel: Failed to create system directory fscache Jul 2 09:00:29.004124 kubelet[1423]: E0702 09:00:29.004083 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.005891 kernel: Failed to create system directory fscache Jul 2 09:00:29.005936 kernel: Failed to create system directory fscache Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:28.971000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.008580 kernel: Failed to create system directory fscache Jul 2 09:00:29.008633 kernel: Failed to create system directory fscache Jul 2 09:00:29.013284 kernel: FS-Cache: Loaded Jul 2 09:00:28.971000 audit[2965]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556ceacf19c0 a1=4c0fc a2=556ce90f02b0 a3=5 items=0 ppid=50 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:28.971000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.061376 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.061478 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.061527 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.062390 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.068196 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.068279 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.069156 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.070104 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.071052 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.072001 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.072951 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.073941 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.074886 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.075894 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.076876 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.077894 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.080734 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.080841 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.080898 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.081726 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.082683 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.083689 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.084569 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.085593 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.086596 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.087545 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.088492 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.089451 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.090396 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.091333 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.092294 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.093264 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.094291 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.096383 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.096455 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.098433 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.098494 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.100446 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.100521 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.102587 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.102662 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.104698 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.104786 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.105734 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.106837 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.108852 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.108934 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.111011 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.111063 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.113044 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.113130 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.114051 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.115301 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.117213 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.117271 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.119280 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.119339 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.121398 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.121486 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.123487 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.123588 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.125619 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.125700 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.127739 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.127823 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.129899 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.129998 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.131987 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.132044 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.134169 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.134259 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.136248 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.136297 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.138406 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.138481 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.140581 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.141904 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.141991 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.144345 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.145839 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.145902 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.148331 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.148423 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.150789 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.150940 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.153309 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.153402 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.155511 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.155595 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.157709 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.159976 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.160025 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.160083 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.161105 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.162187 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.164385 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.164432 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.166628 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.166680 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.168817 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.168901 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.171109 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.171197 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.173349 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.173444 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.175434 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.175519 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.177517 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.177575 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.179584 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.179642 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.181750 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.181839 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.182876 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.184964 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.185063 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.186208 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.193836 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.193988 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.194025 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.194051 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.194076 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.194109 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.195129 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.196448 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.197796 kernel: Failed to create system directory sunrpc Jul 2 09:00:29.042000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.213181 kernel: RPC: Registered named UNIX socket transport module. Jul 2 09:00:29.213360 kernel: RPC: Registered udp transport module. Jul 2 09:00:29.213398 kernel: RPC: Registered tcp transport module. Jul 2 09:00:29.214235 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 09:00:29.042000 audit[2965]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556cead3dad0 a1=1a7f5c a2=556ce90f02b0 a3=5 items=6 ppid=50 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:29.042000 audit: CWD cwd="/" Jul 2 09:00:29.042000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 09:00:29.042000 audit: PATH item=1 name=(null) inode=23598 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 09:00:29.042000 audit: PATH item=2 name=(null) inode=23598 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 09:00:29.042000 audit: PATH item=3 name=(null) inode=23599 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 09:00:29.042000 audit: PATH item=4 name=(null) inode=23598 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 09:00:29.042000 audit: PATH item=5 name=(null) inode=23600 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 09:00:29.042000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.273945 kernel: Failed to create system directory nfs Jul 2 09:00:29.274052 kernel: Failed to create system directory nfs Jul 2 09:00:29.274090 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.275916 kernel: Failed to create system directory nfs Jul 2 09:00:29.275975 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.277951 kernel: Failed to create system directory nfs Jul 2 09:00:29.278053 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.279947 kernel: Failed to create system directory nfs Jul 2 09:00:29.279996 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.281951 kernel: Failed to create system directory nfs Jul 2 09:00:29.281998 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.283962 kernel: Failed to create system directory nfs Jul 2 09:00:29.284021 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.285966 kernel: Failed to create system directory nfs Jul 2 09:00:29.286015 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.287967 kernel: Failed to create system directory nfs Jul 2 09:00:29.288026 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.289961 kernel: Failed to create system directory nfs Jul 2 09:00:29.290020 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.291956 kernel: Failed to create system directory nfs Jul 2 09:00:29.292017 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.294097 kernel: Failed to create system directory nfs Jul 2 09:00:29.294155 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.295076 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.300393 kernel: Failed to create system directory nfs Jul 2 09:00:29.300486 kernel: Failed to create system directory nfs Jul 2 09:00:29.300523 kernel: Failed to create system directory nfs Jul 2 09:00:29.300554 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.302164 kernel: Failed to create system directory nfs Jul 2 09:00:29.302224 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.303321 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.304283 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.305318 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.306216 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.307134 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.308064 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.308994 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.309959 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.311980 kernel: Failed to create system directory nfs Jul 2 09:00:29.312140 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.313019 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.313961 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.315890 kernel: Failed to create system directory nfs Jul 2 09:00:29.315981 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.316643 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.317592 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.318448 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.319333 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.320234 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.321162 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.322231 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.322993 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.324118 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.325043 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.329976 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.331777 kernel: Failed to create system directory nfs Jul 2 09:00:29.331927 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.332778 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.333766 kernel: Failed to create system directory nfs Jul 2 09:00:29.259000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.363895 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 09:00:29.259000 audit[2965]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556ceaf5e790 a1=16dba4 a2=556ce90f02b0 a3=5 items=0 ppid=50 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:29.259000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.421777 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.421883 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.421922 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.423863 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.423924 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.426054 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.426108 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.428173 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.428233 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.430195 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.430252 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.432220 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.432267 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.434288 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.434347 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.436375 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.436422 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.438406 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.438502 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.440533 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.440580 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.441597 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.443604 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.443683 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.451239 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.451337 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.451387 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.451415 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.451441 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.451466 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.452577 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.456285 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.456383 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.456431 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.457374 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.458502 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.459778 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.461732 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.461794 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.463884 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.463972 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.465934 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.465992 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.467958 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.468006 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.469981 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.470038 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.472011 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.472174 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.474538 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.474652 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.476527 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.476585 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.478728 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.478864 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.480891 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.481085 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.483122 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.483243 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.485237 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.485323 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.487341 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.487399 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.489403 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.489454 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.491505 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.491553 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.493581 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.493633 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.495664 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.495754 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.497759 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.497877 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.499842 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.499890 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.501906 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.501957 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.503949 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.504083 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.504994 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.507071 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.507157 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.509079 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.509161 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.511253 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.511307 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.513376 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.513428 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.515493 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.515574 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.516545 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.517718 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.519785 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.519862 kernel: Failed to create system directory nfs4 Jul 2 09:00:29.399000 audit[2970]: AVC avc: denied { confidentiality } for pid=2970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.704992 kernel: NFS: Registering the id_resolver key type Jul 2 09:00:29.705251 kernel: Key type id_resolver registered Jul 2 09:00:29.705296 kernel: Key type id_legacy registered Jul 2 09:00:29.399000 audit[2970]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f00a26ca010 a1=20890c a2=55da7da292b0 a3=5 items=0 ppid=50 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:29.399000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.732828 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.732956 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.734175 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.735348 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.736470 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.736543 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.737584 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.739771 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.739847 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.742956 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.743011 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.743043 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.745011 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.745087 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.747230 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.747294 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.749350 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.749439 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.751503 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.751573 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.754261 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.754332 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.757032 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.757116 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.759251 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.759315 kernel: Failed to create system directory rpcgss Jul 2 09:00:29.724000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 09:00:29.724000 audit[2971]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa33b82b010 a1=70bec a2=55e81a16a2b0 a3=5 items=0 ppid=50 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:29.724000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 09:00:29.816514 nfsidmap[2982]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Jul 2 09:00:29.825482 nfsidmap[2983]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Jul 2 09:00:29.837000 audit[1217]: AVC avc: denied { watch_reads } for pid=1217 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 09:00:29.837000 audit[1217]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558b5c7cc880 a2=10 a3=1a303f3349090bde items=0 ppid=1 pid=1217 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:29.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 09:00:29.837000 audit[1217]: AVC avc: denied { watch_reads } for pid=1217 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 09:00:29.837000 audit[1217]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558b5c7cc880 a2=10 a3=1a303f3349090bde items=0 ppid=1 pid=1217 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:29.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 09:00:29.837000 audit[1217]: AVC avc: denied { watch_reads } for pid=1217 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 09:00:29.837000 audit[1217]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558b5c7cc880 a2=10 a3=1a303f3349090bde items=0 ppid=1 pid=1217 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:29.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 09:00:29.839000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 09:00:29.839000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 09:00:29.839000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 09:00:29.906896 env[1140]: time="2024-07-02T09:00:29.906746014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e265f72b-1d26-45aa-90f2-f452cccfde5a,Namespace:default,Attempt:0,}" Jul 2 09:00:30.004716 kubelet[1423]: E0702 09:00:30.004647 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:30.147759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 09:00:30.147933 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 09:00:30.148045 systemd-networkd[977]: cali5ec59c6bf6e: Link UP Jul 2 09:00:30.148780 systemd-networkd[977]: cali5ec59c6bf6e: Gained carrier Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.041 [INFO][2985] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.73-k8s-test--pod--1-eth0 default e265f72b-1d26-45aa-90f2-f452cccfde5a 1396 0 2024-07-02 08:59:58 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.73 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.041 [INFO][2985] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-eth0" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.082 [INFO][2995] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" HandleID="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Workload="172.24.4.73-k8s-test--pod--1-eth0" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.093 [INFO][2995] ipam_plugin.go 264: Auto assigning IP ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" HandleID="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Workload="172.24.4.73-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312180), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.73", "pod":"test-pod-1", "timestamp":"2024-07-02 09:00:30.082006621 +0000 UTC"}, Hostname:"172.24.4.73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.094 [INFO][2995] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.094 [INFO][2995] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.094 [INFO][2995] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.73' Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.098 [INFO][2995] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.105 [INFO][2995] ipam.go 372: Looking up existing affinities for host host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.114 [INFO][2995] ipam.go 489: Trying affinity for 192.168.8.64/26 host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.117 [INFO][2995] ipam.go 155: Attempting to load block cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.121 [INFO][2995] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.64/26 host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.121 [INFO][2995] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.64/26 handle="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.124 [INFO][2995] ipam.go 1685: Creating new handle: k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.128 [INFO][2995] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.64/26 handle="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.138 [INFO][2995] ipam.go 1216: Successfully claimed IPs: [192.168.8.68/26] block=192.168.8.64/26 handle="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.138 [INFO][2995] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.68/26] handle="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" host="172.24.4.73" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.138 [INFO][2995] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.138 [INFO][2995] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.8.68/26] IPv6=[] ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" HandleID="k8s-pod-network.3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Workload="172.24.4.73-k8s-test--pod--1-eth0" Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.141 [INFO][2985] k8s.go 386: Populated endpoint ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e265f72b-1d26-45aa-90f2-f452cccfde5a", ResourceVersion:"1396", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 09:00:30.168791 env[1140]: 2024-07-02 09:00:30.141 [INFO][2985] k8s.go 387: Calico CNI using IPs: [192.168.8.68/32] ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-eth0" Jul 2 09:00:30.169965 env[1140]: 2024-07-02 09:00:30.141 [INFO][2985] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-eth0" Jul 2 09:00:30.169965 env[1140]: 2024-07-02 09:00:30.148 [INFO][2985] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-eth0" Jul 2 09:00:30.169965 env[1140]: 2024-07-02 09:00:30.150 [INFO][2985] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.73-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e265f72b-1d26-45aa-90f2-f452cccfde5a", ResourceVersion:"1396", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 8, 59, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.73", ContainerID:"3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"76:b7:a2:12:b2:7a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 09:00:30.169965 env[1140]: 2024-07-02 09:00:30.160 [INFO][2985] k8s.go 500: Wrote updated endpoint to datastore ContainerID="3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.73-k8s-test--pod--1-eth0" Jul 2 09:00:30.187000 audit[3015]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=3015 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 09:00:30.187000 audit[3015]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffe2fdc2660 a2=0 a3=7ffe2fdc264c items=0 ppid=2101 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.187000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 09:00:30.190272 env[1140]: time="2024-07-02T09:00:30.190200881Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 09:00:30.190410 env[1140]: time="2024-07-02T09:00:30.190252508Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 09:00:30.190527 env[1140]: time="2024-07-02T09:00:30.190495211Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 09:00:30.190894 env[1140]: time="2024-07-02T09:00:30.190787707Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac pid=3024 runtime=io.containerd.runc.v2 Jul 2 09:00:30.214565 systemd[1]: Started cri-containerd-3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac.scope. Jul 2 09:00:30.225523 systemd[1]: run-containerd-runc-k8s.io-3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac-runc.3Og6J3.mount: Deactivated successfully. Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.248000 audit: BPF prog-id=108 op=LOAD Jul 2 09:00:30.249000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.249000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3024 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362623739613235316439393734643164376235616633363336613639 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3024 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362623739613235316439393734643164376235616633363336613639 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.250000 audit: BPF prog-id=109 op=LOAD Jul 2 09:00:30.250000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a1520 items=0 ppid=3024 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362623739613235316439393734643164376235616633363336613639 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.253000 audit: BPF prog-id=110 op=LOAD Jul 2 09:00:30.253000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a1568 items=0 ppid=3024 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362623739613235316439393734643164376235616633363336613639 Jul 2 09:00:30.258000 audit: BPF prog-id=110 op=UNLOAD Jul 2 09:00:30.258000 audit: BPF prog-id=109 op=UNLOAD Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.259000 audit: BPF prog-id=111 op=LOAD Jul 2 09:00:30.259000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a1978 items=0 ppid=3024 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362623739613235316439393734643164376235616633363336613639 Jul 2 09:00:30.294751 env[1140]: time="2024-07-02T09:00:30.294684894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e265f72b-1d26-45aa-90f2-f452cccfde5a,Namespace:default,Attempt:0,} returns sandbox id \"3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac\"" Jul 2 09:00:30.296705 env[1140]: time="2024-07-02T09:00:30.296610820Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 09:00:30.705922 env[1140]: time="2024-07-02T09:00:30.703990020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:30.708726 env[1140]: time="2024-07-02T09:00:30.708653618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:30.713402 env[1140]: time="2024-07-02T09:00:30.713293682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:30.718124 env[1140]: time="2024-07-02T09:00:30.718068537Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 09:00:30.720243 env[1140]: time="2024-07-02T09:00:30.720186251Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 09:00:30.725195 env[1140]: time="2024-07-02T09:00:30.724939706Z" level=info msg="CreateContainer within sandbox \"3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 09:00:30.754622 env[1140]: time="2024-07-02T09:00:30.754522821Z" level=info msg="CreateContainer within sandbox \"3bb79a251d9974d1d7b5af3636a69dc76c9b842860b1c801a60f19a2b44fb6ac\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"07932c2864b61f7200a73769afda9e04966498319d2e43bc4013e119d34d61c1\"" Jul 2 09:00:30.755761 env[1140]: time="2024-07-02T09:00:30.755643243Z" level=info msg="StartContainer for \"07932c2864b61f7200a73769afda9e04966498319d2e43bc4013e119d34d61c1\"" Jul 2 09:00:30.796090 systemd[1]: Started cri-containerd-07932c2864b61f7200a73769afda9e04966498319d2e43bc4013e119d34d61c1.scope. Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.833000 audit: BPF prog-id=112 op=LOAD Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3024 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393332633238363462363166373230306137333736396166646139 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3024 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393332633238363462363166373230306137333736396166646139 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit: BPF prog-id=113 op=LOAD Jul 2 09:00:30.835000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a1090 items=0 ppid=3024 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393332633238363462363166373230306137333736396166646139 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit: BPF prog-id=114 op=LOAD Jul 2 09:00:30.835000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a10d8 items=0 ppid=3024 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393332633238363462363166373230306137333736396166646139 Jul 2 09:00:30.835000 audit: BPF prog-id=114 op=UNLOAD Jul 2 09:00:30.835000 audit: BPF prog-id=113 op=UNLOAD Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { perfmon } for pid=3064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 09:00:30.835000 audit: BPF prog-id=115 op=LOAD Jul 2 09:00:30.835000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a14e8 items=0 ppid=3024 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 09:00:30.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037393332633238363462363166373230306137333736396166646139 Jul 2 09:00:30.869862 env[1140]: time="2024-07-02T09:00:30.868422464Z" level=info msg="StartContainer for \"07932c2864b61f7200a73769afda9e04966498319d2e43bc4013e119d34d61c1\" returns successfully" Jul 2 09:00:31.005106 kubelet[1423]: E0702 09:00:31.004939 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:31.364475 systemd-networkd[977]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 09:00:32.006006 kubelet[1423]: E0702 09:00:32.005962 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:33.006355 kubelet[1423]: E0702 09:00:33.006263 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:34.008131 kubelet[1423]: E0702 09:00:34.008020 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:35.009014 kubelet[1423]: E0702 09:00:35.008944 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:36.010369 kubelet[1423]: E0702 09:00:36.010261 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:37.010938 kubelet[1423]: E0702 09:00:37.010799 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:38.011612 kubelet[1423]: E0702 09:00:38.011565 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:39.013027 kubelet[1423]: E0702 09:00:39.012918 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:40.013216 kubelet[1423]: E0702 09:00:40.013152 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:40.914625 kubelet[1423]: E0702 09:00:40.914519 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:41.013952 kubelet[1423]: E0702 09:00:41.013841 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:42.014323 kubelet[1423]: E0702 09:00:42.014228 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 09:00:43.015240 kubelet[1423]: E0702 09:00:43.015117 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"