Jul 2 00:46:14.940564 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Jul 2 00:46:14.942983 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 00:46:14.943029 kernel: efi: EFI v2.70 by EDK II Jul 2 00:46:14.943045 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x7173cf98 Jul 2 00:46:14.943059 kernel: ACPI: Early table checksum verification disabled Jul 2 00:46:14.943073 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Jul 2 00:46:14.943089 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Jul 2 00:46:14.943103 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Jul 2 00:46:14.943117 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Jul 2 00:46:14.943131 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Jul 2 00:46:14.943149 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Jul 2 00:46:14.943163 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Jul 2 00:46:14.943176 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Jul 2 00:46:14.943190 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Jul 2 00:46:14.943207 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Jul 2 00:46:14.943226 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Jul 2 00:46:14.943240 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Jul 2 00:46:14.943255 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Jul 2 00:46:14.943269 kernel: printk: bootconsole [uart0] enabled Jul 2 00:46:14.943284 kernel: NUMA: Failed to initialise from firmware Jul 2 00:46:14.943298 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Jul 2 00:46:14.943313 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Jul 2 00:46:14.943328 kernel: Zone ranges: Jul 2 00:46:14.943342 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Jul 2 00:46:14.943357 kernel: DMA32 empty Jul 2 00:46:14.943371 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Jul 2 00:46:14.943389 kernel: Movable zone start for each node Jul 2 00:46:14.943404 kernel: Early memory node ranges Jul 2 00:46:14.943418 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Jul 2 00:46:14.943432 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Jul 2 00:46:14.943447 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Jul 2 00:46:14.943461 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Jul 2 00:46:14.943475 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Jul 2 00:46:14.943490 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Jul 2 00:46:14.943504 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Jul 2 00:46:14.943519 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Jul 2 00:46:14.943533 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Jul 2 00:46:14.943547 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Jul 2 00:46:14.943607 kernel: psci: probing for conduit method from ACPI. Jul 2 00:46:14.943628 kernel: psci: PSCIv1.0 detected in firmware. Jul 2 00:46:14.943652 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 00:46:14.943668 kernel: psci: Trusted OS migration not required Jul 2 00:46:14.943683 kernel: psci: SMC Calling Convention v1.1 Jul 2 00:46:14.943703 kernel: ACPI: SRAT not present Jul 2 00:46:14.943719 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 00:46:14.943734 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 00:46:14.943750 kernel: pcpu-alloc: [0] 0 [0] 1 Jul 2 00:46:14.943766 kernel: Detected PIPT I-cache on CPU0 Jul 2 00:46:14.943781 kernel: CPU features: detected: GIC system register CPU interface Jul 2 00:46:14.943796 kernel: CPU features: detected: Spectre-v2 Jul 2 00:46:14.943811 kernel: CPU features: detected: Spectre-v3a Jul 2 00:46:14.943827 kernel: CPU features: detected: Spectre-BHB Jul 2 00:46:14.943842 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 00:46:14.943857 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 00:46:14.943877 kernel: CPU features: detected: ARM erratum 1742098 Jul 2 00:46:14.943892 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Jul 2 00:46:14.943907 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Jul 2 00:46:14.943922 kernel: Policy zone: Normal Jul 2 00:46:14.943940 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:46:14.943957 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 00:46:14.943972 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 00:46:14.943988 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 00:46:14.944003 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 00:46:14.944018 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Jul 2 00:46:14.944038 kernel: Memory: 3824588K/4030464K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 205876K reserved, 0K cma-reserved) Jul 2 00:46:14.944054 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 00:46:14.944069 kernel: trace event string verifier disabled Jul 2 00:46:14.944084 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 00:46:14.944100 kernel: rcu: RCU event tracing is enabled. Jul 2 00:46:14.944116 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 00:46:14.944131 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 00:46:14.944147 kernel: Tracing variant of Tasks RCU enabled. Jul 2 00:46:14.944162 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 00:46:14.944178 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 00:46:14.944193 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 00:46:14.944208 kernel: GICv3: 96 SPIs implemented Jul 2 00:46:14.944227 kernel: GICv3: 0 Extended SPIs implemented Jul 2 00:46:14.944242 kernel: GICv3: Distributor has no Range Selector support Jul 2 00:46:14.944257 kernel: Root IRQ handler: gic_handle_irq Jul 2 00:46:14.944272 kernel: GICv3: 16 PPIs implemented Jul 2 00:46:14.944287 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Jul 2 00:46:14.944302 kernel: ACPI: SRAT not present Jul 2 00:46:14.944316 kernel: ITS [mem 0x10080000-0x1009ffff] Jul 2 00:46:14.944332 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Jul 2 00:46:14.944347 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Jul 2 00:46:14.944363 kernel: GICv3: using LPI property table @0x00000004000c0000 Jul 2 00:46:14.944378 kernel: ITS: Using hypervisor restricted LPI range [128] Jul 2 00:46:14.944397 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Jul 2 00:46:14.944412 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Jul 2 00:46:14.944427 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Jul 2 00:46:14.944443 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Jul 2 00:46:14.944458 kernel: Console: colour dummy device 80x25 Jul 2 00:46:14.944474 kernel: printk: console [tty1] enabled Jul 2 00:46:14.944490 kernel: ACPI: Core revision 20210730 Jul 2 00:46:14.944506 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Jul 2 00:46:14.944522 kernel: pid_max: default: 32768 minimum: 301 Jul 2 00:46:14.944537 kernel: LSM: Security Framework initializing Jul 2 00:46:14.944556 kernel: SELinux: Initializing. Jul 2 00:46:14.945609 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:46:14.945631 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:46:14.945647 kernel: rcu: Hierarchical SRCU implementation. Jul 2 00:46:14.945663 kernel: Platform MSI: ITS@0x10080000 domain created Jul 2 00:46:14.945679 kernel: PCI/MSI: ITS@0x10080000 domain created Jul 2 00:46:14.945695 kernel: Remapping and enabling EFI services. Jul 2 00:46:14.945711 kernel: smp: Bringing up secondary CPUs ... Jul 2 00:46:14.945726 kernel: Detected PIPT I-cache on CPU1 Jul 2 00:46:14.945742 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Jul 2 00:46:14.945764 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Jul 2 00:46:14.945780 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Jul 2 00:46:14.945795 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 00:46:14.945810 kernel: SMP: Total of 2 processors activated. Jul 2 00:46:14.945826 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 00:46:14.945841 kernel: CPU features: detected: 32-bit EL1 Support Jul 2 00:46:14.945857 kernel: CPU features: detected: CRC32 instructions Jul 2 00:46:14.945872 kernel: CPU: All CPU(s) started at EL1 Jul 2 00:46:14.945888 kernel: alternatives: patching kernel code Jul 2 00:46:14.945907 kernel: devtmpfs: initialized Jul 2 00:46:14.945923 kernel: KASLR disabled due to lack of seed Jul 2 00:46:14.945950 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 00:46:14.945971 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 00:46:14.945987 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 00:46:14.946003 kernel: SMBIOS 3.0.0 present. Jul 2 00:46:14.946018 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Jul 2 00:46:14.946035 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 00:46:14.946051 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 00:46:14.946067 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 00:46:14.946084 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 00:46:14.946104 kernel: audit: initializing netlink subsys (disabled) Jul 2 00:46:14.946121 kernel: audit: type=2000 audit(0.251:1): state=initialized audit_enabled=0 res=1 Jul 2 00:46:14.946137 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 00:46:14.946153 kernel: cpuidle: using governor menu Jul 2 00:46:14.946169 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 00:46:14.946189 kernel: ASID allocator initialised with 32768 entries Jul 2 00:46:14.946206 kernel: ACPI: bus type PCI registered Jul 2 00:46:14.946222 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 00:46:14.946238 kernel: Serial: AMBA PL011 UART driver Jul 2 00:46:14.946254 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 00:46:14.946270 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 00:46:14.946287 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 00:46:14.946303 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 00:46:14.946319 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 00:46:14.946339 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 00:46:14.946355 kernel: ACPI: Added _OSI(Module Device) Jul 2 00:46:14.946371 kernel: ACPI: Added _OSI(Processor Device) Jul 2 00:46:14.946387 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 00:46:14.946404 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 00:46:14.946420 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 00:46:14.946436 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 00:46:14.946452 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 00:46:14.946468 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 00:46:14.946488 kernel: ACPI: Interpreter enabled Jul 2 00:46:14.946504 kernel: ACPI: Using GIC for interrupt routing Jul 2 00:46:14.946520 kernel: ACPI: MCFG table detected, 1 entries Jul 2 00:46:14.946536 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Jul 2 00:46:14.947835 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 00:46:14.948071 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 2 00:46:14.948296 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 2 00:46:14.948518 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Jul 2 00:46:14.951827 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Jul 2 00:46:14.951868 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Jul 2 00:46:14.951886 kernel: acpiphp: Slot [1] registered Jul 2 00:46:14.951903 kernel: acpiphp: Slot [2] registered Jul 2 00:46:14.951920 kernel: acpiphp: Slot [3] registered Jul 2 00:46:14.951936 kernel: acpiphp: Slot [4] registered Jul 2 00:46:14.951953 kernel: acpiphp: Slot [5] registered Jul 2 00:46:14.951969 kernel: acpiphp: Slot [6] registered Jul 2 00:46:14.951985 kernel: acpiphp: Slot [7] registered Jul 2 00:46:14.952009 kernel: acpiphp: Slot [8] registered Jul 2 00:46:14.952026 kernel: acpiphp: Slot [9] registered Jul 2 00:46:14.952042 kernel: acpiphp: Slot [10] registered Jul 2 00:46:14.952058 kernel: acpiphp: Slot [11] registered Jul 2 00:46:14.952075 kernel: acpiphp: Slot [12] registered Jul 2 00:46:14.952091 kernel: acpiphp: Slot [13] registered Jul 2 00:46:14.952107 kernel: acpiphp: Slot [14] registered Jul 2 00:46:14.952123 kernel: acpiphp: Slot [15] registered Jul 2 00:46:14.952139 kernel: acpiphp: Slot [16] registered Jul 2 00:46:14.952159 kernel: acpiphp: Slot [17] registered Jul 2 00:46:14.952175 kernel: acpiphp: Slot [18] registered Jul 2 00:46:14.952191 kernel: acpiphp: Slot [19] registered Jul 2 00:46:14.952207 kernel: acpiphp: Slot [20] registered Jul 2 00:46:14.952224 kernel: acpiphp: Slot [21] registered Jul 2 00:46:14.952240 kernel: acpiphp: Slot [22] registered Jul 2 00:46:14.952256 kernel: acpiphp: Slot [23] registered Jul 2 00:46:14.952272 kernel: acpiphp: Slot [24] registered Jul 2 00:46:14.952288 kernel: acpiphp: Slot [25] registered Jul 2 00:46:14.952304 kernel: acpiphp: Slot [26] registered Jul 2 00:46:14.952324 kernel: acpiphp: Slot [27] registered Jul 2 00:46:14.952340 kernel: acpiphp: Slot [28] registered Jul 2 00:46:14.952356 kernel: acpiphp: Slot [29] registered Jul 2 00:46:14.952372 kernel: acpiphp: Slot [30] registered Jul 2 00:46:14.952388 kernel: acpiphp: Slot [31] registered Jul 2 00:46:14.952404 kernel: PCI host bridge to bus 0000:00 Jul 2 00:46:14.952672 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Jul 2 00:46:14.952868 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 2 00:46:14.953057 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Jul 2 00:46:14.953238 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Jul 2 00:46:14.953468 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Jul 2 00:46:14.953748 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Jul 2 00:46:14.953963 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Jul 2 00:46:14.954181 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Jul 2 00:46:14.954391 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Jul 2 00:46:14.956705 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 00:46:14.956996 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Jul 2 00:46:14.957205 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Jul 2 00:46:14.957419 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Jul 2 00:46:14.957712 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Jul 2 00:46:14.957922 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 00:46:14.958130 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Jul 2 00:46:14.958332 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Jul 2 00:46:14.958541 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Jul 2 00:46:14.969512 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Jul 2 00:46:14.969765 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Jul 2 00:46:14.969958 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Jul 2 00:46:14.970137 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 2 00:46:14.970330 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Jul 2 00:46:14.970353 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 2 00:46:14.970371 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 2 00:46:14.970389 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 2 00:46:14.970406 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 2 00:46:14.970423 kernel: iommu: Default domain type: Translated Jul 2 00:46:14.970439 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 00:46:14.970455 kernel: vgaarb: loaded Jul 2 00:46:14.970472 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 00:46:14.970493 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 00:46:14.970510 kernel: PTP clock support registered Jul 2 00:46:14.970526 kernel: Registered efivars operations Jul 2 00:46:14.970542 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 00:46:14.970558 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 00:46:14.970593 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 00:46:14.970613 kernel: pnp: PnP ACPI init Jul 2 00:46:14.970823 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Jul 2 00:46:14.970854 kernel: pnp: PnP ACPI: found 1 devices Jul 2 00:46:14.970871 kernel: NET: Registered PF_INET protocol family Jul 2 00:46:14.970888 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 00:46:14.970905 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 00:46:14.970921 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 00:46:14.970938 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 00:46:14.970955 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 00:46:14.970971 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 00:46:14.970987 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:46:14.971039 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:46:14.971056 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 00:46:14.971073 kernel: PCI: CLS 0 bytes, default 64 Jul 2 00:46:14.971089 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Jul 2 00:46:14.971106 kernel: kvm [1]: HYP mode not available Jul 2 00:46:14.971122 kernel: Initialise system trusted keyrings Jul 2 00:46:14.971138 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 00:46:14.971155 kernel: Key type asymmetric registered Jul 2 00:46:14.971171 kernel: Asymmetric key parser 'x509' registered Jul 2 00:46:14.971192 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 00:46:14.971208 kernel: io scheduler mq-deadline registered Jul 2 00:46:14.971224 kernel: io scheduler kyber registered Jul 2 00:46:14.971240 kernel: io scheduler bfq registered Jul 2 00:46:14.971476 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Jul 2 00:46:14.971501 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 2 00:46:14.971518 kernel: ACPI: button: Power Button [PWRB] Jul 2 00:46:14.971535 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Jul 2 00:46:14.971556 kernel: ACPI: button: Sleep Button [SLPB] Jul 2 00:46:14.971626 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 00:46:14.971646 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Jul 2 00:46:14.971868 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Jul 2 00:46:14.971895 kernel: printk: console [ttyS0] disabled Jul 2 00:46:14.971912 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Jul 2 00:46:14.971929 kernel: printk: console [ttyS0] enabled Jul 2 00:46:14.971945 kernel: printk: bootconsole [uart0] disabled Jul 2 00:46:14.971962 kernel: thunder_xcv, ver 1.0 Jul 2 00:46:14.971978 kernel: thunder_bgx, ver 1.0 Jul 2 00:46:14.972002 kernel: nicpf, ver 1.0 Jul 2 00:46:14.972018 kernel: nicvf, ver 1.0 Jul 2 00:46:14.972243 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 00:46:14.972446 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T00:46:14 UTC (1719881174) Jul 2 00:46:14.972472 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 00:46:14.972488 kernel: NET: Registered PF_INET6 protocol family Jul 2 00:46:14.972505 kernel: Segment Routing with IPv6 Jul 2 00:46:14.972522 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 00:46:14.972547 kernel: NET: Registered PF_PACKET protocol family Jul 2 00:46:14.972564 kernel: Key type dns_resolver registered Jul 2 00:46:14.972643 kernel: registered taskstats version 1 Jul 2 00:46:14.972662 kernel: Loading compiled-in X.509 certificates Jul 2 00:46:14.972679 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 00:46:14.972696 kernel: Key type .fscrypt registered Jul 2 00:46:14.972712 kernel: Key type fscrypt-provisioning registered Jul 2 00:46:14.972729 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 00:46:14.972745 kernel: ima: Allocated hash algorithm: sha1 Jul 2 00:46:14.972770 kernel: ima: No architecture policies found Jul 2 00:46:14.972786 kernel: clk: Disabling unused clocks Jul 2 00:46:14.972802 kernel: Freeing unused kernel memory: 36352K Jul 2 00:46:14.972818 kernel: Run /init as init process Jul 2 00:46:14.972834 kernel: with arguments: Jul 2 00:46:14.972850 kernel: /init Jul 2 00:46:14.972866 kernel: with environment: Jul 2 00:46:14.972881 kernel: HOME=/ Jul 2 00:46:14.972897 kernel: TERM=linux Jul 2 00:46:14.972918 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 00:46:14.972940 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:46:14.972961 systemd[1]: Detected virtualization amazon. Jul 2 00:46:14.972980 systemd[1]: Detected architecture arm64. Jul 2 00:46:14.972997 systemd[1]: Running in initrd. Jul 2 00:46:14.973014 systemd[1]: No hostname configured, using default hostname. Jul 2 00:46:14.973032 systemd[1]: Hostname set to . Jul 2 00:46:14.973055 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:46:14.973074 systemd[1]: Queued start job for default target initrd.target. Jul 2 00:46:14.973091 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:46:14.973109 systemd[1]: Reached target cryptsetup.target. Jul 2 00:46:14.973126 systemd[1]: Reached target paths.target. Jul 2 00:46:14.973143 systemd[1]: Reached target slices.target. Jul 2 00:46:14.973160 systemd[1]: Reached target swap.target. Jul 2 00:46:14.973178 systemd[1]: Reached target timers.target. Jul 2 00:46:14.973200 systemd[1]: Listening on iscsid.socket. Jul 2 00:46:14.973218 systemd[1]: Listening on iscsiuio.socket. Jul 2 00:46:14.973236 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 00:46:14.973254 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 00:46:14.973272 systemd[1]: Listening on systemd-journald.socket. Jul 2 00:46:14.973290 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:46:14.973308 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:46:14.973326 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:46:14.973348 systemd[1]: Reached target sockets.target. Jul 2 00:46:14.973367 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:46:14.973385 systemd[1]: Finished network-cleanup.service. Jul 2 00:46:14.973402 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 00:46:14.973420 systemd[1]: Starting systemd-journald.service... Jul 2 00:46:14.973438 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:46:14.973455 systemd[1]: Starting systemd-resolved.service... Jul 2 00:46:14.973473 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 00:46:14.973490 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:46:14.973514 kernel: audit: type=1130 audit(1719881174.962:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:14.973533 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 00:46:14.973555 systemd-journald[309]: Journal started Jul 2 00:46:14.973749 systemd-journald[309]: Runtime Journal (/run/log/journal/ec2a7fe509e37dc16cf15e7a18a5ce3c) is 8.0M, max 75.4M, 67.4M free. Jul 2 00:46:14.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:14.941459 systemd-modules-load[310]: Inserted module 'overlay' Jul 2 00:46:14.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:14.989590 kernel: audit: type=1130 audit(1719881174.981:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:14.989629 systemd[1]: Started systemd-journald.service. Jul 2 00:46:14.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.003661 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 00:46:15.023260 kernel: audit: type=1130 audit(1719881174.998:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.023296 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 00:46:15.023330 kernel: audit: type=1130 audit(1719881175.012:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.024967 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 00:46:15.029971 systemd-modules-load[310]: Inserted module 'br_netfilter' Jul 2 00:46:15.030663 kernel: Bridge firewalling registered Jul 2 00:46:15.036882 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 00:46:15.074118 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 00:46:15.077998 kernel: SCSI subsystem initialized Jul 2 00:46:15.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.086958 systemd-resolved[311]: Positive Trust Anchors: Jul 2 00:46:15.086973 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:46:15.087040 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:46:15.090595 kernel: audit: type=1130 audit(1719881175.080:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.124115 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 00:46:15.124221 kernel: device-mapper: uevent: version 1.0.3 Jul 2 00:46:15.128101 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 00:46:15.125771 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 00:46:15.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.141809 kernel: audit: type=1130 audit(1719881175.133:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.141646 systemd[1]: Starting dracut-cmdline.service... Jul 2 00:46:15.150791 systemd-modules-load[310]: Inserted module 'dm_multipath' Jul 2 00:46:15.153262 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:46:15.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.170522 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:46:15.177941 kernel: audit: type=1130 audit(1719881175.161:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.178040 dracut-cmdline[326]: dracut-dracut-053 Jul 2 00:46:15.184391 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:46:15.245994 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:46:15.257601 kernel: audit: type=1130 audit(1719881175.248:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.326614 kernel: Loading iSCSI transport class v2.0-870. Jul 2 00:46:15.348622 kernel: iscsi: registered transport (tcp) Jul 2 00:46:15.376132 kernel: iscsi: registered transport (qla4xxx) Jul 2 00:46:15.376215 kernel: QLogic iSCSI HBA Driver Jul 2 00:46:15.584294 systemd-resolved[311]: Defaulting to hostname 'linux'. Jul 2 00:46:15.586356 kernel: random: crng init done Jul 2 00:46:15.587996 systemd[1]: Started systemd-resolved.service. Jul 2 00:46:15.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.589700 systemd[1]: Reached target nss-lookup.target. Jul 2 00:46:15.600079 kernel: audit: type=1130 audit(1719881175.588:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.618467 systemd[1]: Finished dracut-cmdline.service. Jul 2 00:46:15.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:15.622495 systemd[1]: Starting dracut-pre-udev.service... Jul 2 00:46:15.689615 kernel: raid6: neonx8 gen() 6427 MB/s Jul 2 00:46:15.707609 kernel: raid6: neonx8 xor() 4613 MB/s Jul 2 00:46:15.725605 kernel: raid6: neonx4 gen() 6580 MB/s Jul 2 00:46:15.743624 kernel: raid6: neonx4 xor() 4772 MB/s Jul 2 00:46:15.761610 kernel: raid6: neonx2 gen() 5815 MB/s Jul 2 00:46:15.779623 kernel: raid6: neonx2 xor() 4411 MB/s Jul 2 00:46:15.797610 kernel: raid6: neonx1 gen() 4494 MB/s Jul 2 00:46:15.815622 kernel: raid6: neonx1 xor() 3597 MB/s Jul 2 00:46:15.833612 kernel: raid6: int64x8 gen() 3443 MB/s Jul 2 00:46:15.851620 kernel: raid6: int64x8 xor() 2058 MB/s Jul 2 00:46:15.869610 kernel: raid6: int64x4 gen() 3849 MB/s Jul 2 00:46:15.887623 kernel: raid6: int64x4 xor() 2168 MB/s Jul 2 00:46:15.905617 kernel: raid6: int64x2 gen() 3610 MB/s Jul 2 00:46:15.923627 kernel: raid6: int64x2 xor() 1924 MB/s Jul 2 00:46:15.941614 kernel: raid6: int64x1 gen() 2764 MB/s Jul 2 00:46:15.960584 kernel: raid6: int64x1 xor() 1437 MB/s Jul 2 00:46:15.960649 kernel: raid6: using algorithm neonx4 gen() 6580 MB/s Jul 2 00:46:15.960674 kernel: raid6: .... xor() 4772 MB/s, rmw enabled Jul 2 00:46:15.963517 kernel: raid6: using neon recovery algorithm Jul 2 00:46:15.980611 kernel: xor: measuring software checksum speed Jul 2 00:46:15.982607 kernel: 8regs : 9377 MB/sec Jul 2 00:46:15.985605 kernel: 32regs : 11150 MB/sec Jul 2 00:46:15.988715 kernel: arm64_neon : 9644 MB/sec Jul 2 00:46:15.988759 kernel: xor: using function: 32regs (11150 MB/sec) Jul 2 00:46:16.080628 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 00:46:16.098489 systemd[1]: Finished dracut-pre-udev.service. Jul 2 00:46:16.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:16.100000 audit: BPF prog-id=7 op=LOAD Jul 2 00:46:16.100000 audit: BPF prog-id=8 op=LOAD Jul 2 00:46:16.102906 systemd[1]: Starting systemd-udevd.service... Jul 2 00:46:16.131214 systemd-udevd[508]: Using default interface naming scheme 'v252'. Jul 2 00:46:16.142160 systemd[1]: Started systemd-udevd.service. Jul 2 00:46:16.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:16.150014 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 00:46:16.180004 dracut-pre-trigger[521]: rd.md=0: removing MD RAID activation Jul 2 00:46:16.249185 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 00:46:16.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:16.253647 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:46:16.364081 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:46:16.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:16.493902 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 2 00:46:16.493987 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Jul 2 00:46:16.506446 kernel: ena 0000:00:05.0: ENA device version: 0.10 Jul 2 00:46:16.506891 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Jul 2 00:46:16.507139 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Jul 2 00:46:16.510409 kernel: nvme nvme0: pci function 0000:00:04.0 Jul 2 00:46:16.520629 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:cd:3c:2e:8b:11 Jul 2 00:46:16.520952 kernel: nvme nvme0: 2/0/0 default/read/poll queues Jul 2 00:46:16.528411 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 00:46:16.528485 kernel: GPT:9289727 != 16777215 Jul 2 00:46:16.528510 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 00:46:16.530313 kernel: GPT:9289727 != 16777215 Jul 2 00:46:16.533055 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 00:46:16.533127 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:46:16.538702 (udev-worker)[558]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:46:16.625606 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (572) Jul 2 00:46:16.643000 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 00:46:16.687967 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:46:16.751490 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 00:46:16.757270 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 00:46:16.772849 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 00:46:16.786315 systemd[1]: Starting disk-uuid.service... Jul 2 00:46:16.798773 disk-uuid[668]: Primary Header is updated. Jul 2 00:46:16.798773 disk-uuid[668]: Secondary Entries is updated. Jul 2 00:46:16.798773 disk-uuid[668]: Secondary Header is updated. Jul 2 00:46:16.808630 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:46:16.818612 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:46:17.823605 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 2 00:46:17.823922 disk-uuid[669]: The operation has completed successfully. Jul 2 00:46:17.991199 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 00:46:17.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:17.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:17.991427 systemd[1]: Finished disk-uuid.service. Jul 2 00:46:18.014983 systemd[1]: Starting verity-setup.service... Jul 2 00:46:18.057609 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 00:46:18.156307 systemd[1]: Found device dev-mapper-usr.device. Jul 2 00:46:18.160687 systemd[1]: Mounting sysusr-usr.mount... Jul 2 00:46:18.163795 systemd[1]: Finished verity-setup.service. Jul 2 00:46:18.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:18.253642 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:46:18.254645 systemd[1]: Mounted sysusr-usr.mount. Jul 2 00:46:18.257390 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 00:46:18.261275 systemd[1]: Starting ignition-setup.service... Jul 2 00:46:18.264230 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 00:46:18.292712 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:46:18.292795 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 00:46:18.294716 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 00:46:18.309621 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 00:46:18.327930 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 00:46:18.374037 systemd[1]: Finished ignition-setup.service. Jul 2 00:46:18.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:18.378433 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 00:46:18.444898 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 00:46:18.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:18.447000 audit: BPF prog-id=9 op=LOAD Jul 2 00:46:18.450503 systemd[1]: Starting systemd-networkd.service... Jul 2 00:46:18.501505 systemd-networkd[1108]: lo: Link UP Jul 2 00:46:18.503308 systemd-networkd[1108]: lo: Gained carrier Jul 2 00:46:18.505961 systemd-networkd[1108]: Enumeration completed Jul 2 00:46:18.507554 systemd[1]: Started systemd-networkd.service. Jul 2 00:46:18.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:18.510620 systemd[1]: Reached target network.target. Jul 2 00:46:18.514251 systemd[1]: Starting iscsiuio.service... Jul 2 00:46:18.523765 systemd-networkd[1108]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:46:18.530586 systemd[1]: Started iscsiuio.service. Jul 2 00:46:18.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:18.534402 systemd-networkd[1108]: eth0: Link UP Jul 2 00:46:18.535915 systemd-networkd[1108]: eth0: Gained carrier Jul 2 00:46:18.537690 systemd[1]: Starting iscsid.service... Jul 2 00:46:18.547529 iscsid[1113]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:46:18.547529 iscsid[1113]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 00:46:18.547529 iscsid[1113]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 00:46:18.547529 iscsid[1113]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 00:46:18.547529 iscsid[1113]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:46:18.566066 iscsid[1113]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 00:46:18.559770 systemd[1]: Started iscsid.service. Jul 2 00:46:18.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:18.572812 systemd[1]: Starting dracut-initqueue.service... Jul 2 00:46:18.573115 systemd-networkd[1108]: eth0: DHCPv4 address 172.31.22.71/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 00:46:18.601636 systemd[1]: Finished dracut-initqueue.service. Jul 2 00:46:18.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:18.602510 systemd[1]: Reached target remote-fs-pre.target. Jul 2 00:46:18.603059 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:46:18.603312 systemd[1]: Reached target remote-fs.target. Jul 2 00:46:18.606549 systemd[1]: Starting dracut-pre-mount.service... Jul 2 00:46:18.630498 systemd[1]: Finished dracut-pre-mount.service. Jul 2 00:46:18.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.721095 ignition[1062]: Ignition 2.14.0 Jul 2 00:46:19.722726 ignition[1062]: Stage: fetch-offline Jul 2 00:46:19.724408 ignition[1062]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:46:19.726637 ignition[1062]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:46:19.732947 systemd-networkd[1108]: eth0: Gained IPv6LL Jul 2 00:46:19.744077 ignition[1062]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:46:19.747056 ignition[1062]: Ignition finished successfully Jul 2 00:46:19.750327 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 00:46:19.761660 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 2 00:46:19.761704 kernel: audit: type=1130 audit(1719881179.750:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.763079 systemd[1]: Starting ignition-fetch.service... Jul 2 00:46:19.779456 ignition[1132]: Ignition 2.14.0 Jul 2 00:46:19.779489 ignition[1132]: Stage: fetch Jul 2 00:46:19.779863 ignition[1132]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:46:19.779924 ignition[1132]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:46:19.795009 ignition[1132]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:46:19.799508 ignition[1132]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:46:19.811849 ignition[1132]: INFO : PUT result: OK Jul 2 00:46:19.816040 ignition[1132]: DEBUG : parsed url from cmdline: "" Jul 2 00:46:19.816040 ignition[1132]: INFO : no config URL provided Jul 2 00:46:19.816040 ignition[1132]: INFO : reading system config file "/usr/lib/ignition/user.ign" Jul 2 00:46:19.821725 ignition[1132]: INFO : no config at "/usr/lib/ignition/user.ign" Jul 2 00:46:19.821725 ignition[1132]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:46:19.825863 ignition[1132]: INFO : PUT result: OK Jul 2 00:46:19.827326 ignition[1132]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Jul 2 00:46:19.830624 ignition[1132]: INFO : GET result: OK Jul 2 00:46:19.830624 ignition[1132]: DEBUG : parsing config with SHA512: ad149225405b30efe8502ec301b9002cf21d1de1a3e56557798dfdf9dfaba4a63dc2a68aefc203427238aa5a154dca00b8f093ff0c54a0e3b8b1569da63b5977 Jul 2 00:46:19.837148 unknown[1132]: fetched base config from "system" Jul 2 00:46:19.837195 unknown[1132]: fetched base config from "system" Jul 2 00:46:19.837245 unknown[1132]: fetched user config from "aws" Jul 2 00:46:19.843749 ignition[1132]: fetch: fetch complete Jul 2 00:46:19.845180 ignition[1132]: fetch: fetch passed Jul 2 00:46:19.846867 ignition[1132]: Ignition finished successfully Jul 2 00:46:19.850866 systemd[1]: Finished ignition-fetch.service. Jul 2 00:46:19.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.855171 systemd[1]: Starting ignition-kargs.service... Jul 2 00:46:19.863267 kernel: audit: type=1130 audit(1719881179.852:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.877872 ignition[1138]: Ignition 2.14.0 Jul 2 00:46:19.877903 ignition[1138]: Stage: kargs Jul 2 00:46:19.878236 ignition[1138]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:46:19.878298 ignition[1138]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:46:19.891391 ignition[1138]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:46:19.893624 ignition[1138]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:46:19.896438 ignition[1138]: INFO : PUT result: OK Jul 2 00:46:19.901604 ignition[1138]: kargs: kargs passed Jul 2 00:46:19.902120 ignition[1138]: Ignition finished successfully Jul 2 00:46:19.906105 systemd[1]: Finished ignition-kargs.service. Jul 2 00:46:19.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.910631 systemd[1]: Starting ignition-disks.service... Jul 2 00:46:19.920639 kernel: audit: type=1130 audit(1719881179.907:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.926114 ignition[1144]: Ignition 2.14.0 Jul 2 00:46:19.926992 ignition[1144]: Stage: disks Jul 2 00:46:19.928460 ignition[1144]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:46:19.928529 ignition[1144]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:46:19.941848 ignition[1144]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:46:19.944278 ignition[1144]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:46:19.946874 ignition[1144]: INFO : PUT result: OK Jul 2 00:46:19.951924 ignition[1144]: disks: disks passed Jul 2 00:46:19.952069 ignition[1144]: Ignition finished successfully Jul 2 00:46:19.956023 systemd[1]: Finished ignition-disks.service. Jul 2 00:46:19.958990 systemd[1]: Reached target initrd-root-device.target. Jul 2 00:46:19.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.967787 kernel: audit: type=1130 audit(1719881179.957:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:19.968070 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:46:19.970868 systemd[1]: Reached target local-fs.target. Jul 2 00:46:19.972454 systemd[1]: Reached target sysinit.target. Jul 2 00:46:19.975294 systemd[1]: Reached target basic.target. Jul 2 00:46:19.980802 systemd[1]: Starting systemd-fsck-root.service... Jul 2 00:46:20.039555 systemd-fsck[1152]: ROOT: clean, 614/553520 files, 56019/553472 blocks Jul 2 00:46:20.047329 systemd[1]: Finished systemd-fsck-root.service. Jul 2 00:46:20.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.051252 systemd[1]: Mounting sysroot.mount... Jul 2 00:46:20.060964 kernel: audit: type=1130 audit(1719881180.048:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.075612 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 00:46:20.077393 systemd[1]: Mounted sysroot.mount. Jul 2 00:46:20.080882 systemd[1]: Reached target initrd-root-fs.target. Jul 2 00:46:20.104719 systemd[1]: Mounting sysroot-usr.mount... Jul 2 00:46:20.109558 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 00:46:20.112449 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 00:46:20.115682 systemd[1]: Reached target ignition-diskful.target. Jul 2 00:46:20.120976 systemd[1]: Mounted sysroot-usr.mount. Jul 2 00:46:20.165925 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 00:46:20.170113 systemd[1]: Starting initrd-setup-root.service... Jul 2 00:46:20.188925 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1169) Jul 2 00:46:20.193414 initrd-setup-root[1174]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 00:46:20.197808 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:46:20.197853 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 00:46:20.197878 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 00:46:20.208621 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 00:46:20.212332 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 00:46:20.224904 initrd-setup-root[1200]: cut: /sysroot/etc/group: No such file or directory Jul 2 00:46:20.233049 initrd-setup-root[1208]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 00:46:20.242528 initrd-setup-root[1216]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 00:46:20.583264 systemd[1]: Finished initrd-setup-root.service. Jul 2 00:46:20.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.587504 systemd[1]: Starting ignition-mount.service... Jul 2 00:46:20.595453 kernel: audit: type=1130 audit(1719881180.584:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.596442 systemd[1]: Starting sysroot-boot.service... Jul 2 00:46:20.608736 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 00:46:20.608922 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 00:46:20.642803 systemd[1]: Finished sysroot-boot.service. Jul 2 00:46:20.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.653659 kernel: audit: type=1130 audit(1719881180.645:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.653732 ignition[1237]: INFO : Ignition 2.14.0 Jul 2 00:46:20.653732 ignition[1237]: INFO : Stage: mount Jul 2 00:46:20.653732 ignition[1237]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:46:20.653732 ignition[1237]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:46:20.674015 ignition[1237]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:46:20.676644 ignition[1237]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:46:20.679196 ignition[1237]: INFO : PUT result: OK Jul 2 00:46:20.684006 ignition[1237]: INFO : mount: mount passed Jul 2 00:46:20.685502 ignition[1237]: INFO : Ignition finished successfully Jul 2 00:46:20.688300 systemd[1]: Finished ignition-mount.service. Jul 2 00:46:20.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.697272 systemd[1]: Starting ignition-files.service... Jul 2 00:46:20.706412 kernel: audit: type=1130 audit(1719881180.689:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:20.713184 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 00:46:20.731209 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1244) Jul 2 00:46:20.736099 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:46:20.736157 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 2 00:46:20.736192 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 2 00:46:20.744605 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 2 00:46:20.749479 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 00:46:20.768051 ignition[1263]: INFO : Ignition 2.14.0 Jul 2 00:46:20.769810 ignition[1263]: INFO : Stage: files Jul 2 00:46:20.771395 ignition[1263]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:46:20.773601 ignition[1263]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:46:20.787833 ignition[1263]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:46:20.790486 ignition[1263]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:46:20.793030 ignition[1263]: INFO : PUT result: OK Jul 2 00:46:20.797594 ignition[1263]: DEBUG : files: compiled without relabeling support, skipping Jul 2 00:46:20.801600 ignition[1263]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 00:46:20.801600 ignition[1263]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 00:46:20.846898 ignition[1263]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 00:46:20.849420 ignition[1263]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 00:46:20.852829 unknown[1263]: wrote ssh authorized keys file for user: core Jul 2 00:46:20.854914 ignition[1263]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 00:46:20.858136 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 00:46:20.861273 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:46:20.872096 ignition[1263]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem645043892" Jul 2 00:46:20.877965 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1263) Jul 2 00:46:20.878008 ignition[1263]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem645043892": device or resource busy Jul 2 00:46:20.878008 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem645043892", trying btrfs: device or resource busy Jul 2 00:46:20.878008 ignition[1263]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem645043892" Jul 2 00:46:20.886422 ignition[1263]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem645043892" Jul 2 00:46:20.899618 ignition[1263]: INFO : op(3): [started] unmounting "/mnt/oem645043892" Jul 2 00:46:20.899618 ignition[1263]: INFO : op(3): [finished] unmounting "/mnt/oem645043892" Jul 2 00:46:20.899618 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 2 00:46:20.908882 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 00:46:20.908882 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 00:46:20.908882 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:46:20.908882 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:46:20.908882 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:46:20.908882 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:46:20.908882 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 00:46:20.908882 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:46:20.943592 ignition[1263]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2361334453" Jul 2 00:46:20.949291 ignition[1263]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2361334453": device or resource busy Jul 2 00:46:20.949291 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2361334453", trying btrfs: device or resource busy Jul 2 00:46:20.949291 ignition[1263]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2361334453" Jul 2 00:46:20.960322 ignition[1263]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2361334453" Jul 2 00:46:20.967894 ignition[1263]: INFO : op(6): [started] unmounting "/mnt/oem2361334453" Jul 2 00:46:20.970211 ignition[1263]: INFO : op(6): [finished] unmounting "/mnt/oem2361334453" Jul 2 00:46:20.973331 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 2 00:46:20.973331 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 00:46:20.973331 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:46:20.992499 ignition[1263]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4094927828" Jul 2 00:46:20.995176 ignition[1263]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4094927828": device or resource busy Jul 2 00:46:20.995176 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4094927828", trying btrfs: device or resource busy Jul 2 00:46:20.995176 ignition[1263]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4094927828" Jul 2 00:46:21.004029 ignition[1263]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4094927828" Jul 2 00:46:21.006711 ignition[1263]: INFO : op(9): [started] unmounting "/mnt/oem4094927828" Jul 2 00:46:21.008724 ignition[1263]: INFO : op(9): [finished] unmounting "/mnt/oem4094927828" Jul 2 00:46:21.010762 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 2 00:46:21.013973 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 00:46:21.017394 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 2 00:46:21.032634 ignition[1263]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1106355315" Jul 2 00:46:21.035257 ignition[1263]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1106355315": device or resource busy Jul 2 00:46:21.035257 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1106355315", trying btrfs: device or resource busy Jul 2 00:46:21.035257 ignition[1263]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1106355315" Jul 2 00:46:21.043734 ignition[1263]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1106355315" Jul 2 00:46:21.043734 ignition[1263]: INFO : op(c): [started] unmounting "/mnt/oem1106355315" Jul 2 00:46:21.043734 ignition[1263]: INFO : op(c): [finished] unmounting "/mnt/oem1106355315" Jul 2 00:46:21.049950 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 00:46:21.049950 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:46:21.056802 ignition[1263]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Jul 2 00:46:21.535160 ignition[1263]: INFO : GET result: OK Jul 2 00:46:21.977927 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(e): [started] processing unit "nvidia.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(e): [finished] processing unit "nvidia.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(f): [started] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(f): [finished] setting preset to enabled for "amazon-ssm-agent.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(10): [started] setting preset to enabled for "nvidia.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(10): [finished] setting preset to enabled for "nvidia.service" Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 00:46:21.982618 ignition[1263]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 00:46:22.024634 ignition[1263]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:46:22.027833 ignition[1263]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:46:22.027833 ignition[1263]: INFO : files: files passed Jul 2 00:46:22.027833 ignition[1263]: INFO : Ignition finished successfully Jul 2 00:46:22.039422 systemd[1]: Finished ignition-files.service. Jul 2 00:46:22.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.048608 kernel: audit: type=1130 audit(1719881182.039:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.055429 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 00:46:22.057781 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 00:46:22.059288 systemd[1]: Starting ignition-quench.service... Jul 2 00:46:22.073483 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 00:46:22.073921 systemd[1]: Finished ignition-quench.service. Jul 2 00:46:22.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.084599 kernel: audit: type=1130 audit(1719881182.075:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.090687 initrd-setup-root-after-ignition[1288]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 00:46:22.094897 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 00:46:22.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.096987 systemd[1]: Reached target ignition-complete.target. Jul 2 00:46:22.102916 systemd[1]: Starting initrd-parse-etc.service... Jul 2 00:46:22.132015 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 00:46:22.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.132238 systemd[1]: Finished initrd-parse-etc.service. Jul 2 00:46:22.136067 systemd[1]: Reached target initrd-fs.target. Jul 2 00:46:22.136485 systemd[1]: Reached target initrd.target. Jul 2 00:46:22.137973 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 00:46:22.139589 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 00:46:22.168238 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 00:46:22.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.171608 systemd[1]: Starting initrd-cleanup.service... Jul 2 00:46:22.193105 systemd[1]: Stopped target nss-lookup.target. Jul 2 00:46:22.196425 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 00:46:22.199994 systemd[1]: Stopped target timers.target. Jul 2 00:46:22.203002 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 00:46:22.205084 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 00:46:22.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.208676 systemd[1]: Stopped target initrd.target. Jul 2 00:46:22.211728 systemd[1]: Stopped target basic.target. Jul 2 00:46:22.214695 systemd[1]: Stopped target ignition-complete.target. Jul 2 00:46:22.218241 systemd[1]: Stopped target ignition-diskful.target. Jul 2 00:46:22.221815 systemd[1]: Stopped target initrd-root-device.target. Jul 2 00:46:22.225466 systemd[1]: Stopped target remote-fs.target. Jul 2 00:46:22.228687 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 00:46:22.232124 systemd[1]: Stopped target sysinit.target. Jul 2 00:46:22.234947 systemd[1]: Stopped target local-fs.target. Jul 2 00:46:22.237835 systemd[1]: Stopped target local-fs-pre.target. Jul 2 00:46:22.240796 systemd[1]: Stopped target swap.target. Jul 2 00:46:22.243455 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 00:46:22.245491 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 00:46:22.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.248781 systemd[1]: Stopped target cryptsetup.target. Jul 2 00:46:22.251804 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 00:46:22.253779 systemd[1]: Stopped dracut-initqueue.service. Jul 2 00:46:22.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.256904 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 00:46:22.259196 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 00:46:22.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.262908 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 00:46:22.264724 systemd[1]: Stopped ignition-files.service. Jul 2 00:46:22.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.269373 systemd[1]: Stopping ignition-mount.service... Jul 2 00:46:22.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.271592 systemd[1]: Stopping iscsiuio.service... Jul 2 00:46:22.273968 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 00:46:22.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.274262 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 00:46:22.277562 systemd[1]: Stopping sysroot-boot.service... Jul 2 00:46:22.283778 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 00:46:22.284111 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 00:46:22.286389 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 00:46:22.286643 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 00:46:22.303388 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 00:46:22.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.309944 systemd[1]: Finished initrd-cleanup.service. Jul 2 00:46:22.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.317314 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 00:46:22.319398 systemd[1]: Stopped iscsiuio.service. Jul 2 00:46:22.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.324775 ignition[1301]: INFO : Ignition 2.14.0 Jul 2 00:46:22.324775 ignition[1301]: INFO : Stage: umount Jul 2 00:46:22.324775 ignition[1301]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 00:46:22.324775 ignition[1301]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 2 00:46:22.342761 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 00:46:22.350488 ignition[1301]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 2 00:46:22.352795 ignition[1301]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 2 00:46:22.356384 ignition[1301]: INFO : PUT result: OK Jul 2 00:46:22.361419 ignition[1301]: INFO : umount: umount passed Jul 2 00:46:22.363018 ignition[1301]: INFO : Ignition finished successfully Jul 2 00:46:22.365949 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 00:46:22.367227 systemd[1]: Stopped ignition-mount.service. Jul 2 00:46:22.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.370764 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 00:46:22.371063 systemd[1]: Stopped sysroot-boot.service. Jul 2 00:46:22.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.373106 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 00:46:22.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.373211 systemd[1]: Stopped ignition-disks.service. Jul 2 00:46:22.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.377236 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 00:46:22.377335 systemd[1]: Stopped ignition-kargs.service. Jul 2 00:46:22.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.378834 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 00:46:22.378927 systemd[1]: Stopped ignition-fetch.service. Jul 2 00:46:22.380462 systemd[1]: Stopped target network.target. Jul 2 00:46:22.381900 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 00:46:22.382215 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 00:46:22.385156 systemd[1]: Stopped target paths.target. Jul 2 00:46:22.386518 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 00:46:22.386639 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 00:46:22.386764 systemd[1]: Stopped target slices.target. Jul 2 00:46:22.390877 systemd[1]: Stopped target sockets.target. Jul 2 00:46:22.392323 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 00:46:22.392389 systemd[1]: Closed iscsid.socket. Jul 2 00:46:22.393698 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 00:46:22.393774 systemd[1]: Closed iscsiuio.socket. Jul 2 00:46:22.395059 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 00:46:22.396071 systemd[1]: Stopped ignition-setup.service. Jul 2 00:46:22.398220 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 00:46:22.398316 systemd[1]: Stopped initrd-setup-root.service. Jul 2 00:46:22.401049 systemd[1]: Stopping systemd-networkd.service... Jul 2 00:46:22.402629 systemd[1]: Stopping systemd-resolved.service... Jul 2 00:46:22.421638 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 00:46:22.424455 systemd[1]: Stopped systemd-resolved.service. Jul 2 00:46:22.429178 systemd-networkd[1108]: eth0: DHCPv6 lease lost Jul 2 00:46:22.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.439352 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 00:46:22.438000 audit: BPF prog-id=6 op=UNLOAD Jul 2 00:46:22.441444 systemd[1]: Stopped systemd-networkd.service. Jul 2 00:46:22.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.443000 audit: BPF prog-id=9 op=UNLOAD Jul 2 00:46:22.444917 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 00:46:22.445012 systemd[1]: Closed systemd-networkd.socket. Jul 2 00:46:22.450731 systemd[1]: Stopping network-cleanup.service... Jul 2 00:46:22.455752 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 00:46:22.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.455898 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 00:46:22.458944 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 00:46:22.459041 systemd[1]: Stopped systemd-sysctl.service. Jul 2 00:46:22.460747 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 00:46:22.460838 systemd[1]: Stopped systemd-modules-load.service. Jul 2 00:46:22.464496 systemd[1]: Stopping systemd-udevd.service... Jul 2 00:46:22.467870 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 00:46:22.486626 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 00:46:22.486861 systemd[1]: Stopped network-cleanup.service. Jul 2 00:46:22.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.500000 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 00:46:22.500533 systemd[1]: Stopped systemd-udevd.service. Jul 2 00:46:22.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.505558 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 00:46:22.505842 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 00:46:22.511251 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 00:46:22.511510 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 00:46:22.516927 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 00:46:22.517192 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 00:46:22.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.521872 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 00:46:22.522137 systemd[1]: Stopped dracut-cmdline.service. Jul 2 00:46:22.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.527355 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 00:46:22.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.527460 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 00:46:22.535314 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 00:46:22.540707 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 00:46:22.542134 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 00:46:22.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.557453 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 00:46:22.559471 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 00:46:22.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:22.563519 systemd[1]: Reached target initrd-switch-root.target. Jul 2 00:46:22.567998 systemd[1]: Starting initrd-switch-root.service... Jul 2 00:46:22.583371 systemd[1]: Switching root. Jul 2 00:46:22.610600 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Jul 2 00:46:22.610679 iscsid[1113]: iscsid shutting down. Jul 2 00:46:22.612393 systemd-journald[309]: Journal stopped Jul 2 00:46:28.567349 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 00:46:28.567484 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 00:46:28.567521 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 00:46:28.567554 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 00:46:28.573287 kernel: SELinux: policy capability open_perms=1 Jul 2 00:46:28.573337 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 00:46:28.573370 kernel: SELinux: policy capability always_check_network=0 Jul 2 00:46:28.573401 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 00:46:28.573434 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 00:46:28.573464 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 00:46:28.573811 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 00:46:28.573889 systemd[1]: Successfully loaded SELinux policy in 125.707ms. Jul 2 00:46:28.579128 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.500ms. Jul 2 00:46:28.579192 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:46:28.579225 systemd[1]: Detected virtualization amazon. Jul 2 00:46:28.579259 systemd[1]: Detected architecture arm64. Jul 2 00:46:28.579291 systemd[1]: Detected first boot. Jul 2 00:46:28.579324 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:46:28.579356 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 00:46:28.579391 systemd[1]: Populated /etc with preset unit settings. Jul 2 00:46:28.579428 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:46:28.579484 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:46:28.579522 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:46:28.579556 kernel: kauditd_printk_skb: 55 callbacks suppressed Jul 2 00:46:28.579686 kernel: audit: type=1334 audit(1719881188.141:87): prog-id=12 op=LOAD Jul 2 00:46:28.579721 kernel: audit: type=1334 audit(1719881188.141:88): prog-id=3 op=UNLOAD Jul 2 00:46:28.579753 kernel: audit: type=1334 audit(1719881188.143:89): prog-id=13 op=LOAD Jul 2 00:46:28.579789 kernel: audit: type=1334 audit(1719881188.145:90): prog-id=14 op=LOAD Jul 2 00:46:28.579822 kernel: audit: type=1334 audit(1719881188.145:91): prog-id=4 op=UNLOAD Jul 2 00:46:28.579853 kernel: audit: type=1334 audit(1719881188.145:92): prog-id=5 op=UNLOAD Jul 2 00:46:28.579883 kernel: audit: type=1334 audit(1719881188.149:93): prog-id=15 op=LOAD Jul 2 00:46:28.579912 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 00:46:28.579945 kernel: audit: type=1334 audit(1719881188.149:94): prog-id=12 op=UNLOAD Jul 2 00:46:28.579975 systemd[1]: Stopped iscsid.service. Jul 2 00:46:28.580007 kernel: audit: type=1334 audit(1719881188.151:95): prog-id=16 op=LOAD Jul 2 00:46:28.580037 kernel: audit: type=1334 audit(1719881188.153:96): prog-id=17 op=LOAD Jul 2 00:46:28.580070 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 00:46:28.580100 systemd[1]: Stopped initrd-switch-root.service. Jul 2 00:46:28.580131 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 00:46:28.580162 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 00:46:28.580194 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 00:46:28.580228 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 00:46:28.580260 systemd[1]: Created slice system-getty.slice. Jul 2 00:46:28.580295 systemd[1]: Created slice system-modprobe.slice. Jul 2 00:46:28.580329 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 00:46:28.580360 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 00:46:28.580390 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 00:46:28.580421 systemd[1]: Created slice user.slice. Jul 2 00:46:28.580451 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:46:28.580484 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 00:46:28.580515 systemd[1]: Set up automount boot.automount. Jul 2 00:46:28.580545 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 00:46:28.580599 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 00:46:28.580632 systemd[1]: Stopped target initrd-fs.target. Jul 2 00:46:28.580666 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 00:46:28.580700 systemd[1]: Reached target integritysetup.target. Jul 2 00:46:28.580731 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:46:28.580763 systemd[1]: Reached target remote-fs.target. Jul 2 00:46:28.580792 systemd[1]: Reached target slices.target. Jul 2 00:46:28.580825 systemd[1]: Reached target swap.target. Jul 2 00:46:28.580855 systemd[1]: Reached target torcx.target. Jul 2 00:46:28.580885 systemd[1]: Reached target veritysetup.target. Jul 2 00:46:28.580922 systemd[1]: Listening on systemd-coredump.socket. Jul 2 00:46:28.580953 systemd[1]: Listening on systemd-initctl.socket. Jul 2 00:46:28.580983 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:46:28.581015 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:46:28.581045 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:46:28.581075 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 00:46:28.581106 systemd[1]: Mounting dev-hugepages.mount... Jul 2 00:46:28.581137 systemd[1]: Mounting dev-mqueue.mount... Jul 2 00:46:28.581171 systemd[1]: Mounting media.mount... Jul 2 00:46:28.581212 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 00:46:28.581245 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 00:46:28.581275 systemd[1]: Mounting tmp.mount... Jul 2 00:46:28.581308 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 00:46:28.581341 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:46:28.581371 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:46:28.581402 systemd[1]: Starting modprobe@configfs.service... Jul 2 00:46:28.581431 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:46:28.581468 systemd[1]: Starting modprobe@drm.service... Jul 2 00:46:28.581503 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:46:28.581534 systemd[1]: Starting modprobe@fuse.service... Jul 2 00:46:28.586840 systemd[1]: Starting modprobe@loop.service... Jul 2 00:46:28.586907 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 00:46:28.586942 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 00:46:28.586972 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 00:46:28.587015 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 00:46:28.587082 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 00:46:28.587114 systemd[1]: Stopped systemd-journald.service. Jul 2 00:46:28.587149 kernel: fuse: init (API version 7.34) Jul 2 00:46:28.587179 systemd[1]: Starting systemd-journald.service... Jul 2 00:46:28.587208 kernel: loop: module loaded Jul 2 00:46:28.587238 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:46:28.587270 systemd[1]: Starting systemd-network-generator.service... Jul 2 00:46:28.587303 systemd[1]: Starting systemd-remount-fs.service... Jul 2 00:46:28.587333 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:46:28.587365 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 00:46:28.587395 systemd[1]: Stopped verity-setup.service. Jul 2 00:46:28.587430 systemd[1]: Mounted dev-hugepages.mount. Jul 2 00:46:28.587479 systemd[1]: Mounted dev-mqueue.mount. Jul 2 00:46:28.587512 systemd[1]: Mounted media.mount. Jul 2 00:46:28.587542 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 00:46:28.592418 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 00:46:28.592477 systemd[1]: Mounted tmp.mount. Jul 2 00:46:28.592511 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:46:28.592544 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 00:46:28.592603 systemd[1]: Finished modprobe@configfs.service. Jul 2 00:46:28.592666 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:46:28.592701 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:46:28.592732 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:46:28.592765 systemd[1]: Finished modprobe@drm.service. Jul 2 00:46:28.592795 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:46:28.592830 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:46:28.592860 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 00:46:28.592891 systemd[1]: Finished modprobe@fuse.service. Jul 2 00:46:28.592921 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:46:28.592954 systemd[1]: Finished modprobe@loop.service. Jul 2 00:46:28.592987 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:46:28.593019 systemd[1]: Finished systemd-network-generator.service. Jul 2 00:46:28.593053 systemd[1]: Finished systemd-remount-fs.service. Jul 2 00:46:28.593083 systemd[1]: Reached target network-pre.target. Jul 2 00:46:28.593114 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 00:46:28.593147 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 00:46:28.593178 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 00:46:28.593208 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 00:46:28.593240 systemd-journald[1409]: Journal started Jul 2 00:46:28.593340 systemd-journald[1409]: Runtime Journal (/run/log/journal/ec2a7fe509e37dc16cf15e7a18a5ce3c) is 8.0M, max 75.4M, 67.4M free. Jul 2 00:46:23.530000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 00:46:23.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:46:23.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:46:23.757000 audit: BPF prog-id=10 op=LOAD Jul 2 00:46:23.757000 audit: BPF prog-id=10 op=UNLOAD Jul 2 00:46:23.757000 audit: BPF prog-id=11 op=LOAD Jul 2 00:46:23.757000 audit: BPF prog-id=11 op=UNLOAD Jul 2 00:46:23.986000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 00:46:23.986000 audit[1334]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022314 a1=40000283d8 a2=40000268c0 a3=32 items=0 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:28.601118 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:46:23.986000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:46:23.990000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 00:46:23.990000 audit[1334]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000223f9 a2=1ed a3=0 items=2 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:23.990000 audit: CWD cwd="/" Jul 2 00:46:23.990000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:23.990000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:46:23.990000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:46:28.141000 audit: BPF prog-id=12 op=LOAD Jul 2 00:46:28.141000 audit: BPF prog-id=3 op=UNLOAD Jul 2 00:46:28.143000 audit: BPF prog-id=13 op=LOAD Jul 2 00:46:28.145000 audit: BPF prog-id=14 op=LOAD Jul 2 00:46:28.145000 audit: BPF prog-id=4 op=UNLOAD Jul 2 00:46:28.145000 audit: BPF prog-id=5 op=UNLOAD Jul 2 00:46:28.149000 audit: BPF prog-id=15 op=LOAD Jul 2 00:46:28.149000 audit: BPF prog-id=12 op=UNLOAD Jul 2 00:46:28.151000 audit: BPF prog-id=16 op=LOAD Jul 2 00:46:28.153000 audit: BPF prog-id=17 op=LOAD Jul 2 00:46:28.153000 audit: BPF prog-id=13 op=UNLOAD Jul 2 00:46:28.153000 audit: BPF prog-id=14 op=UNLOAD Jul 2 00:46:28.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.167000 audit: BPF prog-id=15 op=UNLOAD Jul 2 00:46:28.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.612475 systemd[1]: Starting systemd-random-seed.service... Jul 2 00:46:28.612557 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:46:28.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.403000 audit: BPF prog-id=18 op=LOAD Jul 2 00:46:28.403000 audit: BPF prog-id=19 op=LOAD Jul 2 00:46:28.403000 audit: BPF prog-id=20 op=LOAD Jul 2 00:46:28.403000 audit: BPF prog-id=16 op=UNLOAD Jul 2 00:46:28.403000 audit: BPF prog-id=17 op=UNLOAD Jul 2 00:46:28.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.544000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 00:46:28.544000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffa015f20 a2=4000 a3=1 items=0 ppid=1 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:28.544000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 00:46:28.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:23.972638 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:46:28.140352 systemd[1]: Queued start job for default target multi-user.target. Jul 2 00:46:28.641821 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:46:28.641871 systemd[1]: Started systemd-journald.service. Jul 2 00:46:28.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:23.983318 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:46:28.157424 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 00:46:28.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:23.983371 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:46:28.628974 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 00:46:23.983438 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 00:46:28.630849 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 00:46:23.983464 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 00:46:28.639067 systemd[1]: Starting systemd-journal-flush.service... Jul 2 00:46:23.983550 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 00:46:28.644422 systemd[1]: Finished systemd-random-seed.service. Jul 2 00:46:23.983618 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 00:46:28.646317 systemd[1]: Reached target first-boot-complete.target. Jul 2 00:46:23.984030 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 00:46:23.984191 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:46:23.984233 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:46:23.986374 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 00:46:23.986499 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 00:46:23.986622 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 00:46:23.986695 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 00:46:23.986758 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 00:46:23.986828 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 00:46:28.674682 systemd-journald[1409]: Time spent on flushing to /var/log/journal/ec2a7fe509e37dc16cf15e7a18a5ce3c is 65.591ms for 1112 entries. Jul 2 00:46:28.674682 systemd-journald[1409]: System Journal (/var/log/journal/ec2a7fe509e37dc16cf15e7a18a5ce3c) is 8.0M, max 195.6M, 187.6M free. Jul 2 00:46:28.778411 systemd-journald[1409]: Received client request to flush runtime journal. Jul 2 00:46:28.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:27.193067 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:46:28.695347 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:46:27.193619 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:46:28.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:28.711852 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 00:46:27.193871 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:46:28.715843 systemd[1]: Starting systemd-sysusers.service... Jul 2 00:46:27.194319 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:46:28.772284 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:46:27.194423 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 00:46:28.776329 systemd[1]: Starting systemd-udev-settle.service... Jul 2 00:46:27.194555 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-07-02T00:46:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 00:46:28.781208 systemd[1]: Finished systemd-journal-flush.service. Jul 2 00:46:28.797966 udevadm[1455]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 00:46:28.863716 systemd[1]: Finished systemd-sysusers.service. Jul 2 00:46:28.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:29.546151 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 00:46:29.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:29.550000 audit: BPF prog-id=21 op=LOAD Jul 2 00:46:29.550000 audit: BPF prog-id=22 op=LOAD Jul 2 00:46:29.550000 audit: BPF prog-id=7 op=UNLOAD Jul 2 00:46:29.550000 audit: BPF prog-id=8 op=UNLOAD Jul 2 00:46:29.553096 systemd[1]: Starting systemd-udevd.service... Jul 2 00:46:29.589908 systemd-udevd[1456]: Using default interface naming scheme 'v252'. Jul 2 00:46:29.644069 systemd[1]: Started systemd-udevd.service. Jul 2 00:46:29.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:29.646000 audit: BPF prog-id=23 op=LOAD Jul 2 00:46:29.649051 systemd[1]: Starting systemd-networkd.service... Jul 2 00:46:29.673000 audit: BPF prog-id=24 op=LOAD Jul 2 00:46:29.673000 audit: BPF prog-id=25 op=LOAD Jul 2 00:46:29.673000 audit: BPF prog-id=26 op=LOAD Jul 2 00:46:29.676958 systemd[1]: Starting systemd-userdbd.service... Jul 2 00:46:29.765858 systemd[1]: Started systemd-userdbd.service. Jul 2 00:46:29.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:29.795266 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 00:46:29.830325 (udev-worker)[1472]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:46:29.932091 systemd-networkd[1462]: lo: Link UP Jul 2 00:46:29.932120 systemd-networkd[1462]: lo: Gained carrier Jul 2 00:46:29.933197 systemd-networkd[1462]: Enumeration completed Jul 2 00:46:29.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:29.933397 systemd[1]: Started systemd-networkd.service. Jul 2 00:46:29.933437 systemd-networkd[1462]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:46:29.937659 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 00:46:29.942652 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:46:29.943640 systemd-networkd[1462]: eth0: Link UP Jul 2 00:46:29.943999 systemd-networkd[1462]: eth0: Gained carrier Jul 2 00:46:29.954859 systemd-networkd[1462]: eth0: DHCPv4 address 172.31.22.71/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 2 00:46:30.050605 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1465) Jul 2 00:46:30.171701 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:46:30.174522 systemd[1]: Finished systemd-udev-settle.service. Jul 2 00:46:30.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.184015 systemd[1]: Starting lvm2-activation-early.service... Jul 2 00:46:30.252725 lvm[1575]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:46:30.292060 systemd[1]: Finished lvm2-activation-early.service. Jul 2 00:46:30.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.294157 systemd[1]: Reached target cryptsetup.target. Jul 2 00:46:30.298092 systemd[1]: Starting lvm2-activation.service... Jul 2 00:46:30.306328 lvm[1576]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:46:30.345338 systemd[1]: Finished lvm2-activation.service. Jul 2 00:46:30.347109 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:46:30.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.348724 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 00:46:30.348768 systemd[1]: Reached target local-fs.target. Jul 2 00:46:30.350243 systemd[1]: Reached target machines.target. Jul 2 00:46:30.353858 systemd[1]: Starting ldconfig.service... Jul 2 00:46:30.356499 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:46:30.356675 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:46:30.359126 systemd[1]: Starting systemd-boot-update.service... Jul 2 00:46:30.362789 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 00:46:30.367135 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 00:46:30.371296 systemd[1]: Starting systemd-sysext.service... Jul 2 00:46:30.408903 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 00:46:30.411764 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1578 (bootctl) Jul 2 00:46:30.416472 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 00:46:30.422695 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:46:30.423051 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 00:46:30.447611 kernel: loop0: detected capacity change from 0 to 194096 Jul 2 00:46:30.468014 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 00:46:30.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.532628 systemd-fsck[1588]: fsck.fat 4.2 (2021-01-31) Jul 2 00:46:30.532628 systemd-fsck[1588]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Jul 2 00:46:30.537760 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 00:46:30.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.543465 systemd[1]: Mounting boot.mount... Jul 2 00:46:30.563321 systemd[1]: Mounted boot.mount. Jul 2 00:46:30.591948 systemd[1]: Finished systemd-boot-update.service. Jul 2 00:46:30.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.646671 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 00:46:30.673600 kernel: loop1: detected capacity change from 0 to 194096 Jul 2 00:46:30.694749 (sd-sysext)[1605]: Using extensions 'kubernetes'. Jul 2 00:46:30.695544 (sd-sysext)[1605]: Merged extensions into '/usr'. Jul 2 00:46:30.734198 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:46:30.736371 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:46:30.739485 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:46:30.747226 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:46:30.751501 systemd[1]: Starting modprobe@loop.service... Jul 2 00:46:30.753706 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:46:30.754007 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:46:30.761255 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:46:30.763833 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:46:30.764185 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:46:30.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.766960 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:46:30.767274 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:46:30.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.770056 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:46:30.770494 systemd[1]: Finished modprobe@loop.service. Jul 2 00:46:30.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.775529 systemd[1]: Finished systemd-sysext.service. Jul 2 00:46:30.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:30.780974 systemd[1]: Starting ensure-sysext.service... Jul 2 00:46:30.782495 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:46:30.782693 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:46:30.785266 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 00:46:30.810691 systemd[1]: Reloading. Jul 2 00:46:30.852728 systemd-tmpfiles[1612]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 00:46:30.858380 systemd-tmpfiles[1612]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 00:46:30.877307 systemd-tmpfiles[1612]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 00:46:30.906533 /usr/lib/systemd/system-generators/torcx-generator[1632]: time="2024-07-02T00:46:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:46:30.908000 /usr/lib/systemd/system-generators/torcx-generator[1632]: time="2024-07-02T00:46:30Z" level=info msg="torcx already run" Jul 2 00:46:31.173509 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:46:31.173555 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:46:31.221631 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:46:31.365318 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 00:46:31.368000 audit: BPF prog-id=27 op=LOAD Jul 2 00:46:31.368000 audit: BPF prog-id=24 op=UNLOAD Jul 2 00:46:31.369000 audit: BPF prog-id=28 op=LOAD Jul 2 00:46:31.369000 audit: BPF prog-id=29 op=LOAD Jul 2 00:46:31.369000 audit: BPF prog-id=25 op=UNLOAD Jul 2 00:46:31.369000 audit: BPF prog-id=26 op=UNLOAD Jul 2 00:46:31.370000 audit: BPF prog-id=30 op=LOAD Jul 2 00:46:31.370000 audit: BPF prog-id=31 op=LOAD Jul 2 00:46:31.370000 audit: BPF prog-id=21 op=UNLOAD Jul 2 00:46:31.370000 audit: BPF prog-id=22 op=UNLOAD Jul 2 00:46:31.372000 audit: BPF prog-id=32 op=LOAD Jul 2 00:46:31.372000 audit: BPF prog-id=18 op=UNLOAD Jul 2 00:46:31.372000 audit: BPF prog-id=33 op=LOAD Jul 2 00:46:31.372000 audit: BPF prog-id=34 op=LOAD Jul 2 00:46:31.372000 audit: BPF prog-id=19 op=UNLOAD Jul 2 00:46:31.372000 audit: BPF prog-id=20 op=UNLOAD Jul 2 00:46:31.380000 audit: BPF prog-id=35 op=LOAD Jul 2 00:46:31.380000 audit: BPF prog-id=23 op=UNLOAD Jul 2 00:46:31.390149 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 00:46:31.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.394544 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 00:46:31.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.403308 systemd[1]: Starting audit-rules.service... Jul 2 00:46:31.408231 systemd[1]: Starting clean-ca-certificates.service... Jul 2 00:46:31.413329 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 00:46:31.415000 audit: BPF prog-id=36 op=LOAD Jul 2 00:46:31.419213 systemd[1]: Starting systemd-resolved.service... Jul 2 00:46:31.423000 audit: BPF prog-id=37 op=LOAD Jul 2 00:46:31.428068 systemd[1]: Starting systemd-timesyncd.service... Jul 2 00:46:31.432911 systemd[1]: Starting systemd-update-utmp.service... Jul 2 00:46:31.450000 audit[1695]: SYSTEM_BOOT pid=1695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.458585 systemd[1]: Finished clean-ca-certificates.service. Jul 2 00:46:31.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.480952 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:46:31.486615 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.489776 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:46:31.494749 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:46:31.499549 systemd[1]: Starting modprobe@loop.service... Jul 2 00:46:31.501151 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.501540 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:46:31.501963 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:46:31.505202 systemd[1]: Finished systemd-update-utmp.service. Jul 2 00:46:31.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.507923 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:46:31.508241 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:46:31.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.513474 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.519247 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:46:31.520829 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.521174 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:46:31.521493 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:46:31.523253 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:46:31.523653 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:46:31.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.526714 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:46:31.534131 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.538209 systemd[1]: Starting modprobe@drm.service... Jul 2 00:46:31.542268 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:46:31.544033 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.544376 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:46:31.545724 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:46:31.551237 systemd[1]: Finished ensure-sysext.service. Jul 2 00:46:31.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.555813 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:46:31.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.556133 systemd[1]: Finished modprobe@loop.service. Jul 2 00:46:31.563179 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:46:31.563522 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:46:31.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.565951 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:46:31.567794 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:46:31.568102 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:46:31.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.570075 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.573445 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:46:31.573767 systemd[1]: Finished modprobe@drm.service. Jul 2 00:46:31.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.596240 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 00:46:31.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:31.662959 ldconfig[1577]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 00:46:31.665000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 00:46:31.665000 audit[1715]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff7568310 a2=420 a3=0 items=0 ppid=1689 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:31.665000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 00:46:31.669716 systemd[1]: Finished audit-rules.service. Jul 2 00:46:31.678526 augenrules[1715]: No rules Jul 2 00:46:31.680184 systemd[1]: Finished ldconfig.service. Jul 2 00:46:31.684526 systemd[1]: Starting systemd-update-done.service... Jul 2 00:46:31.686459 systemd[1]: Started systemd-timesyncd.service. Jul 2 00:46:31.688425 systemd[1]: Reached target time-set.target. Jul 2 00:46:31.697839 systemd-resolved[1692]: Positive Trust Anchors: Jul 2 00:46:31.697867 systemd-resolved[1692]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:46:31.697919 systemd-resolved[1692]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:46:31.704124 systemd[1]: Finished systemd-update-done.service. Jul 2 00:46:31.748049 systemd-resolved[1692]: Defaulting to hostname 'linux'. Jul 2 00:46:31.751394 systemd[1]: Started systemd-resolved.service. Jul 2 00:46:31.753106 systemd[1]: Reached target network.target. Jul 2 00:46:31.754561 systemd[1]: Reached target nss-lookup.target. Jul 2 00:46:31.756085 systemd[1]: Reached target sysinit.target. Jul 2 00:46:31.757769 systemd[1]: Started motdgen.path. Jul 2 00:46:31.759022 systemd-timesyncd[1694]: Contacted time server 65.100.46.166:123 (0.flatcar.pool.ntp.org). Jul 2 00:46:31.759122 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 00:46:31.759126 systemd-timesyncd[1694]: Initial clock synchronization to Tue 2024-07-02 00:46:32.061395 UTC. Jul 2 00:46:31.761329 systemd[1]: Started logrotate.timer. Jul 2 00:46:31.762859 systemd[1]: Started mdadm.timer. Jul 2 00:46:31.764141 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 00:46:31.765721 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 00:46:31.765774 systemd[1]: Reached target paths.target. Jul 2 00:46:31.767155 systemd[1]: Reached target timers.target. Jul 2 00:46:31.769035 systemd[1]: Listening on dbus.socket. Jul 2 00:46:31.772407 systemd[1]: Starting docker.socket... Jul 2 00:46:31.778684 systemd[1]: Listening on sshd.socket. Jul 2 00:46:31.780347 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:46:31.781296 systemd[1]: Listening on docker.socket. Jul 2 00:46:31.782888 systemd[1]: Reached target sockets.target. Jul 2 00:46:31.784368 systemd[1]: Reached target basic.target. Jul 2 00:46:31.785868 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.785945 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:46:31.788052 systemd[1]: Starting containerd.service... Jul 2 00:46:31.792210 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 00:46:31.796186 systemd[1]: Starting dbus.service... Jul 2 00:46:31.800053 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 00:46:31.804312 systemd[1]: Starting extend-filesystems.service... Jul 2 00:46:31.806269 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 00:46:31.812314 systemd[1]: Starting motdgen.service... Jul 2 00:46:31.815984 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 00:46:31.820261 systemd[1]: Starting sshd-keygen.service... Jul 2 00:46:31.828175 systemd[1]: Starting systemd-logind.service... Jul 2 00:46:31.829930 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:46:31.830105 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 00:46:31.850716 jq[1734]: true Jul 2 00:46:31.831090 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 00:46:31.834025 systemd[1]: Starting update-engine.service... Jul 2 00:46:31.838044 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 00:46:31.860433 jq[1727]: false Jul 2 00:46:31.866235 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 00:46:31.866658 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 00:46:31.870390 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 00:46:31.870788 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 00:46:31.893812 jq[1736]: true Jul 2 00:46:31.940076 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 00:46:31.940474 systemd[1]: Finished motdgen.service. Jul 2 00:46:31.942942 extend-filesystems[1728]: Found loop1 Jul 2 00:46:31.942942 extend-filesystems[1728]: Found nvme0n1 Jul 2 00:46:31.942942 extend-filesystems[1728]: Found nvme0n1p1 Jul 2 00:46:31.942942 extend-filesystems[1728]: Found nvme0n1p2 Jul 2 00:46:31.942942 extend-filesystems[1728]: Found nvme0n1p3 Jul 2 00:46:31.942942 extend-filesystems[1728]: Found usr Jul 2 00:46:31.958871 extend-filesystems[1728]: Found nvme0n1p4 Jul 2 00:46:31.958871 extend-filesystems[1728]: Found nvme0n1p6 Jul 2 00:46:31.958871 extend-filesystems[1728]: Found nvme0n1p7 Jul 2 00:46:31.958871 extend-filesystems[1728]: Found nvme0n1p9 Jul 2 00:46:31.958871 extend-filesystems[1728]: Checking size of /dev/nvme0n1p9 Jul 2 00:46:31.946347 systemd[1]: Started dbus.service. Jul 2 00:46:31.946042 dbus-daemon[1726]: [system] SELinux support is enabled Jul 2 00:46:31.957249 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 00:46:31.986778 dbus-daemon[1726]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1462 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 00:46:31.957293 systemd[1]: Reached target system-config.target. Jul 2 00:46:31.957439 systemd-networkd[1462]: eth0: Gained IPv6LL Jul 2 00:46:31.960138 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 00:46:31.960184 systemd[1]: Reached target user-config.target. Jul 2 00:46:31.977270 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 00:46:31.983794 systemd[1]: Reached target network-online.target. Jul 2 00:46:31.987932 systemd[1]: Started amazon-ssm-agent.service. Jul 2 00:46:31.992524 systemd[1]: Starting kubelet.service... Jul 2 00:46:31.996484 systemd[1]: Started nvidia.service. Jul 2 00:46:32.009995 systemd[1]: Starting systemd-hostnamed.service... Jul 2 00:46:32.129592 extend-filesystems[1728]: Resized partition /dev/nvme0n1p9 Jul 2 00:46:32.149774 extend-filesystems[1780]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 00:46:32.155107 update_engine[1733]: I0702 00:46:32.154032 1733 main.cc:92] Flatcar Update Engine starting Jul 2 00:46:32.164461 systemd[1]: Started update-engine.service. Jul 2 00:46:32.165961 update_engine[1733]: I0702 00:46:32.165581 1733 update_check_scheduler.cc:74] Next update check in 6m0s Jul 2 00:46:32.169564 systemd[1]: Started locksmithd.service. Jul 2 00:46:32.196635 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Jul 2 00:46:32.293070 env[1741]: time="2024-07-02T00:46:32.291332154Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 00:46:32.293568 bash[1785]: Updated "/home/core/.ssh/authorized_keys" Jul 2 00:46:32.294594 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Jul 2 00:46:32.295103 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 00:46:32.328263 amazon-ssm-agent[1765]: 2024/07/02 00:46:32 Failed to load instance info from vault. RegistrationKey does not exist. Jul 2 00:46:32.329512 extend-filesystems[1780]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Jul 2 00:46:32.329512 extend-filesystems[1780]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 2 00:46:32.329512 extend-filesystems[1780]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Jul 2 00:46:32.336348 extend-filesystems[1728]: Resized filesystem in /dev/nvme0n1p9 Jul 2 00:46:32.350804 amazon-ssm-agent[1765]: Initializing new seelog logger Jul 2 00:46:32.350804 amazon-ssm-agent[1765]: New Seelog Logger Creation Complete Jul 2 00:46:32.350804 amazon-ssm-agent[1765]: 2024/07/02 00:46:32 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 00:46:32.350804 amazon-ssm-agent[1765]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jul 2 00:46:32.350804 amazon-ssm-agent[1765]: 2024/07/02 00:46:32 processing appconfig overrides Jul 2 00:46:32.337100 systemd-logind[1732]: Watching system buttons on /dev/input/event0 (Power Button) Jul 2 00:46:32.337139 systemd-logind[1732]: Watching system buttons on /dev/input/event1 (Sleep Button) Jul 2 00:46:32.348483 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 00:46:32.349024 systemd[1]: Finished extend-filesystems.service. Jul 2 00:46:32.349956 systemd-logind[1732]: New seat seat0. Jul 2 00:46:32.357161 systemd[1]: Started systemd-logind.service. Jul 2 00:46:32.424404 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 00:46:32.500723 env[1741]: time="2024-07-02T00:46:32.500648603Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 00:46:32.501152 env[1741]: time="2024-07-02T00:46:32.501112284Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:46:32.504070 env[1741]: time="2024-07-02T00:46:32.503985169Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:46:32.507558 env[1741]: time="2024-07-02T00:46:32.507486894Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:46:32.508642 env[1741]: time="2024-07-02T00:46:32.508562227Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:46:32.508820 env[1741]: time="2024-07-02T00:46:32.508786314Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 00:46:32.509217 env[1741]: time="2024-07-02T00:46:32.509178799Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 00:46:32.509347 env[1741]: time="2024-07-02T00:46:32.509316569Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 00:46:32.510124 env[1741]: time="2024-07-02T00:46:32.510042263Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:46:32.510824 env[1741]: time="2024-07-02T00:46:32.510782830Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:46:32.511522 env[1741]: time="2024-07-02T00:46:32.511444615Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:46:32.515539 env[1741]: time="2024-07-02T00:46:32.515479137Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 00:46:32.515928 env[1741]: time="2024-07-02T00:46:32.515893818Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 00:46:32.516350 env[1741]: time="2024-07-02T00:46:32.516312821Z" level=info msg="metadata content store policy set" policy=shared Jul 2 00:46:32.527344 env[1741]: time="2024-07-02T00:46:32.526376437Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 00:46:32.527344 env[1741]: time="2024-07-02T00:46:32.526475371Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 00:46:32.527344 env[1741]: time="2024-07-02T00:46:32.526565686Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 00:46:32.527344 env[1741]: time="2024-07-02T00:46:32.526721342Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.527344 env[1741]: time="2024-07-02T00:46:32.526758821Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.527344 env[1741]: time="2024-07-02T00:46:32.526818794Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.527344 env[1741]: time="2024-07-02T00:46:32.526856920Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.528156 env[1741]: time="2024-07-02T00:46:32.528092754Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.528348 env[1741]: time="2024-07-02T00:46:32.528283249Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.528455 env[1741]: time="2024-07-02T00:46:32.528324078Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.528627 env[1741]: time="2024-07-02T00:46:32.528596255Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.528825 env[1741]: time="2024-07-02T00:46:32.528757056Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 00:46:32.529217 env[1741]: time="2024-07-02T00:46:32.529156092Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 00:46:32.529636 env[1741]: time="2024-07-02T00:46:32.529600841Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 00:46:32.530823 env[1741]: time="2024-07-02T00:46:32.530740382Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 00:46:32.531363 env[1741]: time="2024-07-02T00:46:32.531299110Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.531824 env[1741]: time="2024-07-02T00:46:32.531787552Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 00:46:32.532484 env[1741]: time="2024-07-02T00:46:32.532440868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.532990 env[1741]: time="2024-07-02T00:46:32.532940894Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.533202 env[1741]: time="2024-07-02T00:46:32.533156424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.533687 env[1741]: time="2024-07-02T00:46:32.533628387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.533910 env[1741]: time="2024-07-02T00:46:32.533876850Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.534061 env[1741]: time="2024-07-02T00:46:32.534031248Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.534232 env[1741]: time="2024-07-02T00:46:32.534202386Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.534708 env[1741]: time="2024-07-02T00:46:32.534653263Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.534946 env[1741]: time="2024-07-02T00:46:32.534878745Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 00:46:32.535440 env[1741]: time="2024-07-02T00:46:32.535401826Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.538859 env[1741]: time="2024-07-02T00:46:32.538803371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.539444 env[1741]: time="2024-07-02T00:46:32.539406130Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.539976 env[1741]: time="2024-07-02T00:46:32.539940247Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 00:46:32.540180 env[1741]: time="2024-07-02T00:46:32.540144069Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 00:46:32.540573 env[1741]: time="2024-07-02T00:46:32.540537488Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 00:46:32.540823 env[1741]: time="2024-07-02T00:46:32.540789587Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 00:46:32.541006 env[1741]: time="2024-07-02T00:46:32.540974825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 00:46:32.541534 env[1741]: time="2024-07-02T00:46:32.541401227Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 00:46:32.542933 env[1741]: time="2024-07-02T00:46:32.542886744Z" level=info msg="Connect containerd service" Jul 2 00:46:32.543266 env[1741]: time="2024-07-02T00:46:32.543154014Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 00:46:32.544925 env[1741]: time="2024-07-02T00:46:32.544869683Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:46:32.547574 env[1741]: time="2024-07-02T00:46:32.547520275Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 00:46:32.551202 env[1741]: time="2024-07-02T00:46:32.551120810Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 00:46:32.551835 env[1741]: time="2024-07-02T00:46:32.551769729Z" level=info msg="containerd successfully booted in 0.297705s" Jul 2 00:46:32.551921 systemd[1]: Started containerd.service. Jul 2 00:46:32.565173 env[1741]: time="2024-07-02T00:46:32.565062557Z" level=info msg="Start subscribing containerd event" Jul 2 00:46:32.565321 env[1741]: time="2024-07-02T00:46:32.565208199Z" level=info msg="Start recovering state" Jul 2 00:46:32.565385 env[1741]: time="2024-07-02T00:46:32.565335606Z" level=info msg="Start event monitor" Jul 2 00:46:32.565472 env[1741]: time="2024-07-02T00:46:32.565376884Z" level=info msg="Start snapshots syncer" Jul 2 00:46:32.565472 env[1741]: time="2024-07-02T00:46:32.565402604Z" level=info msg="Start cni network conf syncer for default" Jul 2 00:46:32.565472 env[1741]: time="2024-07-02T00:46:32.565424065Z" level=info msg="Start streaming server" Jul 2 00:46:32.706542 dbus-daemon[1726]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 00:46:32.706916 systemd[1]: Started systemd-hostnamed.service. Jul 2 00:46:32.713928 dbus-daemon[1726]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1768 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 00:46:32.719122 systemd[1]: Starting polkit.service... Jul 2 00:46:32.749003 polkitd[1854]: Started polkitd version 121 Jul 2 00:46:32.778131 polkitd[1854]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 00:46:32.778448 polkitd[1854]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 00:46:32.780382 polkitd[1854]: Finished loading, compiling and executing 2 rules Jul 2 00:46:32.783391 dbus-daemon[1726]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 00:46:32.783704 systemd[1]: Started polkit.service. Jul 2 00:46:32.786177 polkitd[1854]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 00:46:32.824002 systemd-hostnamed[1768]: Hostname set to (transient) Jul 2 00:46:32.824185 systemd-resolved[1692]: System hostname changed to 'ip-172-31-22-71'. Jul 2 00:46:32.960210 coreos-metadata[1725]: Jul 02 00:46:32.959 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jul 2 00:46:32.962192 coreos-metadata[1725]: Jul 02 00:46:32.961 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Jul 2 00:46:32.963260 coreos-metadata[1725]: Jul 02 00:46:32.963 INFO Fetch successful Jul 2 00:46:32.963637 coreos-metadata[1725]: Jul 02 00:46:32.963 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 2 00:46:32.964649 coreos-metadata[1725]: Jul 02 00:46:32.964 INFO Fetch successful Jul 2 00:46:32.967669 unknown[1725]: wrote ssh authorized keys file for user: core Jul 2 00:46:32.975962 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Create new startup processor Jul 2 00:46:32.987411 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [LongRunningPluginsManager] registered plugins: {} Jul 2 00:46:32.989671 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing bookkeeping folders Jul 2 00:46:32.989865 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO removing the completed state files Jul 2 00:46:32.990026 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing bookkeeping folders for long running plugins Jul 2 00:46:32.990718 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Jul 2 00:46:32.990906 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing healthcheck folders for long running plugins Jul 2 00:46:32.991032 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing locations for inventory plugin Jul 2 00:46:32.991194 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing default location for custom inventory Jul 2 00:46:32.991348 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing default location for file inventory Jul 2 00:46:32.993935 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Initializing default location for role inventory Jul 2 00:46:33.011385 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Init the cloudwatchlogs publisher Jul 2 00:46:33.011659 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:runPowerShellScript Jul 2 00:46:33.011812 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:configureDocker Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:refreshAssociation Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:downloadContent Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:runDocument Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:softwareInventory Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:updateSsmAgent Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:runDockerAction Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform independent plugin aws:configurePackage Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO [instanceID=i-046ea63f4017e3bbe] Successfully loaded platform dependent plugin aws:runShellScript Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Jul 2 00:46:33.012356 amazon-ssm-agent[1765]: 2024-07-02 00:46:32 INFO OS: linux, Arch: arm64 Jul 2 00:46:33.013432 amazon-ssm-agent[1765]: datastore file /var/lib/amazon/ssm/i-046ea63f4017e3bbe/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Jul 2 00:46:33.013432 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [LongRunningPluginsManager] starting long running plugin manager Jul 2 00:46:33.021382 update-ssh-keys[1896]: Updated "/home/core/.ssh/authorized_keys" Jul 2 00:46:33.022591 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 00:46:33.116678 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Jul 2 00:46:33.211881 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Jul 2 00:46:33.306854 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] Starting document processing engine... Jul 2 00:46:33.402436 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] [EngineProcessor] Starting Jul 2 00:46:33.454808 locksmithd[1786]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 00:46:33.497297 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Jul 2 00:46:33.592460 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] Starting message polling Jul 2 00:46:33.687918 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] Starting send replies to MDS Jul 2 00:46:33.783384 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [instanceID=i-046ea63f4017e3bbe] Starting association polling Jul 2 00:46:33.879127 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Jul 2 00:46:33.975093 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] [Association] Launching response handler Jul 2 00:46:33.983290 systemd[1]: Started kubelet.service. Jul 2 00:46:34.071226 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Jul 2 00:46:34.151381 sshd_keygen[1756]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 00:46:34.167700 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Jul 2 00:46:34.197434 systemd[1]: Finished sshd-keygen.service. Jul 2 00:46:34.202115 systemd[1]: Starting issuegen.service... Jul 2 00:46:34.214005 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 00:46:34.214405 systemd[1]: Finished issuegen.service. Jul 2 00:46:34.219038 systemd[1]: Starting systemd-user-sessions.service... Jul 2 00:46:34.234127 systemd[1]: Finished systemd-user-sessions.service. Jul 2 00:46:34.239185 systemd[1]: Started getty@tty1.service. Jul 2 00:46:34.243737 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 00:46:34.246184 systemd[1]: Reached target getty.target. Jul 2 00:46:34.248098 systemd[1]: Reached target multi-user.target. Jul 2 00:46:34.252830 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 00:46:34.266899 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Jul 2 00:46:34.274318 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 00:46:34.274724 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 00:46:34.276831 systemd[1]: Startup finished in 1.159s (kernel) + 8.811s (initrd) + 10.875s (userspace) = 20.847s. Jul 2 00:46:34.363656 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [OfflineService] Starting document processing engine... Jul 2 00:46:34.460507 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [OfflineService] [EngineProcessor] Starting Jul 2 00:46:34.557750 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [OfflineService] [EngineProcessor] Initial processing Jul 2 00:46:34.655057 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [OfflineService] Starting message polling Jul 2 00:46:34.752595 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [OfflineService] Starting send replies to MDS Jul 2 00:46:34.828661 kubelet[1919]: E0702 00:46:34.828488 1919 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:46:34.833088 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:46:34.833393 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:46:34.833845 systemd[1]: kubelet.service: Consumed 1.440s CPU time. Jul 2 00:46:34.850675 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [HealthCheck] HealthCheck reporting agent health. Jul 2 00:46:34.950988 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] Starting session document processing engine... Jul 2 00:46:35.050907 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] [EngineProcessor] Starting Jul 2 00:46:35.149439 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Jul 2 00:46:35.250191 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-046ea63f4017e3bbe, requestId: f88a249b-9989-41f7-a457-275cd4164e26 Jul 2 00:46:35.349759 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] listening reply. Jul 2 00:46:35.448855 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [StartupProcessor] Executing startup processor tasks Jul 2 00:46:35.547977 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Jul 2 00:46:35.649692 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Jul 2 00:46:35.749954 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.5 Jul 2 00:46:35.850819 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-046ea63f4017e3bbe?role=subscribe&stream=input Jul 2 00:46:35.950862 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-046ea63f4017e3bbe?role=subscribe&stream=input Jul 2 00:46:36.053078 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] Starting receiving message from control channel Jul 2 00:46:36.153605 amazon-ssm-agent[1765]: 2024-07-02 00:46:33 INFO [MessageGatewayService] [EngineProcessor] Initial processing Jul 2 00:46:40.400547 systemd[1]: Created slice system-sshd.slice. Jul 2 00:46:40.403021 systemd[1]: Started sshd@0-172.31.22.71:22-139.178.89.65:39234.service. Jul 2 00:46:40.670788 sshd[1941]: Accepted publickey for core from 139.178.89.65 port 39234 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:40.675815 sshd[1941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:40.694443 systemd[1]: Created slice user-500.slice. Jul 2 00:46:40.698209 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 00:46:40.706718 systemd-logind[1732]: New session 1 of user core. Jul 2 00:46:40.721965 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 00:46:40.726524 systemd[1]: Starting user@500.service... Jul 2 00:46:40.733351 (systemd)[1944]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:40.924928 systemd[1944]: Queued start job for default target default.target. Jul 2 00:46:40.926028 systemd[1944]: Reached target paths.target. Jul 2 00:46:40.926082 systemd[1944]: Reached target sockets.target. Jul 2 00:46:40.926115 systemd[1944]: Reached target timers.target. Jul 2 00:46:40.926146 systemd[1944]: Reached target basic.target. Jul 2 00:46:40.926241 systemd[1944]: Reached target default.target. Jul 2 00:46:40.926307 systemd[1944]: Startup finished in 180ms. Jul 2 00:46:40.927380 systemd[1]: Started user@500.service. Jul 2 00:46:40.931238 systemd[1]: Started session-1.scope. Jul 2 00:46:41.077618 systemd[1]: Started sshd@1-172.31.22.71:22-139.178.89.65:39236.service. Jul 2 00:46:41.254664 sshd[1953]: Accepted publickey for core from 139.178.89.65 port 39236 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:41.257225 sshd[1953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:41.265752 systemd-logind[1732]: New session 2 of user core. Jul 2 00:46:41.266797 systemd[1]: Started session-2.scope. Jul 2 00:46:41.397234 sshd[1953]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:41.401984 systemd[1]: sshd@1-172.31.22.71:22-139.178.89.65:39236.service: Deactivated successfully. Jul 2 00:46:41.403288 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 00:46:41.404480 systemd-logind[1732]: Session 2 logged out. Waiting for processes to exit. Jul 2 00:46:41.406188 systemd-logind[1732]: Removed session 2. Jul 2 00:46:41.426504 systemd[1]: Started sshd@2-172.31.22.71:22-139.178.89.65:39246.service. Jul 2 00:46:41.606345 sshd[1959]: Accepted publickey for core from 139.178.89.65 port 39246 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:41.609365 sshd[1959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:41.617491 systemd-logind[1732]: New session 3 of user core. Jul 2 00:46:41.618464 systemd[1]: Started session-3.scope. Jul 2 00:46:41.742568 sshd[1959]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:41.747114 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 00:46:41.748256 systemd[1]: sshd@2-172.31.22.71:22-139.178.89.65:39246.service: Deactivated successfully. Jul 2 00:46:41.749834 systemd-logind[1732]: Session 3 logged out. Waiting for processes to exit. Jul 2 00:46:41.751689 systemd-logind[1732]: Removed session 3. Jul 2 00:46:41.771040 systemd[1]: Started sshd@3-172.31.22.71:22-139.178.89.65:39252.service. Jul 2 00:46:41.951748 sshd[1965]: Accepted publickey for core from 139.178.89.65 port 39252 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:41.954362 sshd[1965]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:41.963267 systemd[1]: Started session-4.scope. Jul 2 00:46:41.964252 systemd-logind[1732]: New session 4 of user core. Jul 2 00:46:42.097255 sshd[1965]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:42.102878 systemd-logind[1732]: Session 4 logged out. Waiting for processes to exit. Jul 2 00:46:42.105388 systemd[1]: sshd@3-172.31.22.71:22-139.178.89.65:39252.service: Deactivated successfully. Jul 2 00:46:42.106782 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 00:46:42.107912 systemd-logind[1732]: Removed session 4. Jul 2 00:46:42.125805 systemd[1]: Started sshd@4-172.31.22.71:22-139.178.89.65:39256.service. Jul 2 00:46:42.303597 sshd[1971]: Accepted publickey for core from 139.178.89.65 port 39256 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:42.306475 sshd[1971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:42.315374 systemd[1]: Started session-5.scope. Jul 2 00:46:42.316670 systemd-logind[1732]: New session 5 of user core. Jul 2 00:46:42.466229 sudo[1974]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 00:46:42.467332 sudo[1974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:46:42.479848 dbus-daemon[1726]: avc: received setenforce notice (enforcing=1) Jul 2 00:46:42.482486 sudo[1974]: pam_unix(sudo:session): session closed for user root Jul 2 00:46:42.508710 sshd[1971]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:42.514201 systemd-logind[1732]: Session 5 logged out. Waiting for processes to exit. Jul 2 00:46:42.514712 systemd[1]: sshd@4-172.31.22.71:22-139.178.89.65:39256.service: Deactivated successfully. Jul 2 00:46:42.515915 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 00:46:42.517503 systemd-logind[1732]: Removed session 5. Jul 2 00:46:42.536362 systemd[1]: Started sshd@5-172.31.22.71:22-139.178.89.65:39272.service. Jul 2 00:46:42.713871 sshd[1978]: Accepted publickey for core from 139.178.89.65 port 39272 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:42.716352 sshd[1978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:42.725178 systemd[1]: Started session-6.scope. Jul 2 00:46:42.726680 systemd-logind[1732]: New session 6 of user core. Jul 2 00:46:42.833792 sudo[1982]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 00:46:42.834841 sudo[1982]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:46:42.840765 sudo[1982]: pam_unix(sudo:session): session closed for user root Jul 2 00:46:42.850357 sudo[1981]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 00:46:42.850945 sudo[1981]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:46:42.868864 systemd[1]: Stopping audit-rules.service... Jul 2 00:46:42.870000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:46:42.873045 kernel: kauditd_printk_skb: 110 callbacks suppressed Jul 2 00:46:42.873135 kernel: audit: type=1305 audit(1719881202.870:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:46:42.873995 auditctl[1985]: No rules Jul 2 00:46:42.874945 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 00:46:42.875285 systemd[1]: Stopped audit-rules.service. Jul 2 00:46:42.870000 audit[1985]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd6062da0 a2=420 a3=0 items=0 ppid=1 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:42.886868 kernel: audit: type=1300 audit(1719881202.870:203): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd6062da0 a2=420 a3=0 items=0 ppid=1 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:42.888437 systemd[1]: Starting audit-rules.service... Jul 2 00:46:42.870000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:46:42.893119 kernel: audit: type=1327 audit(1719881202.870:203): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:46:42.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.900641 kernel: audit: type=1131 audit(1719881202.872:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.922467 augenrules[2002]: No rules Jul 2 00:46:42.924088 systemd[1]: Finished audit-rules.service. Jul 2 00:46:42.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.927983 sudo[1981]: pam_unix(sudo:session): session closed for user root Jul 2 00:46:42.926000 audit[1981]: USER_END pid=1981 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.940392 kernel: audit: type=1130 audit(1719881202.922:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.940473 kernel: audit: type=1106 audit(1719881202.926:206): pid=1981 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.926000 audit[1981]: CRED_DISP pid=1981 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.947648 kernel: audit: type=1104 audit(1719881202.926:207): pid=1981 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.954772 sshd[1978]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:42.956000 audit[1978]: USER_END pid=1978 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:42.959679 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 00:46:42.960903 systemd[1]: sshd@5-172.31.22.71:22-139.178.89.65:39272.service: Deactivated successfully. Jul 2 00:46:42.956000 audit[1978]: CRED_DISP pid=1978 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:42.970150 kernel: audit: type=1106 audit(1719881202.956:208): pid=1978 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:42.978039 systemd-logind[1732]: Session 6 logged out. Waiting for processes to exit. Jul 2 00:46:42.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.71:22-139.178.89.65:39272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.987196 kernel: audit: type=1104 audit(1719881202.956:209): pid=1978 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:42.987306 kernel: audit: type=1131 audit(1719881202.957:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.71:22-139.178.89.65:39272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.987798 systemd[1]: Started sshd@6-172.31.22.71:22-139.178.89.65:39280.service. Jul 2 00:46:42.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.71:22-139.178.89.65:39280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:42.991951 systemd-logind[1732]: Removed session 6. Jul 2 00:46:43.161000 audit[2008]: USER_ACCT pid=2008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:43.163381 sshd[2008]: Accepted publickey for core from 139.178.89.65 port 39280 ssh2: RSA SHA256:8y6JErBds/WgSuzw1b/2wKJnltsiajeNUW/adFCuF/s Jul 2 00:46:43.164000 audit[2008]: CRED_ACQ pid=2008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:43.164000 audit[2008]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3ba1630 a2=3 a3=1 items=0 ppid=1 pid=2008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:43.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:46:43.167162 sshd[2008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:46:43.176277 systemd-logind[1732]: New session 7 of user core. Jul 2 00:46:43.177414 systemd[1]: Started session-7.scope. Jul 2 00:46:43.185000 audit[2008]: USER_START pid=2008 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:43.188000 audit[2010]: CRED_ACQ pid=2010 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:43.284000 audit[2011]: USER_ACCT pid=2011 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:43.285928 sudo[2011]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 00:46:43.285000 audit[2011]: CRED_REFR pid=2011 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:43.286554 sudo[2011]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:46:43.289000 audit[2011]: USER_START pid=2011 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:43.316174 systemd[1]: Starting coreos-metadata.service... Jul 2 00:46:43.488787 coreos-metadata[2015]: Jul 02 00:46:43.488 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jul 2 00:46:43.489904 coreos-metadata[2015]: Jul 02 00:46:43.489 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Jul 2 00:46:43.490556 coreos-metadata[2015]: Jul 02 00:46:43.490 INFO Fetch successful Jul 2 00:46:43.490866 coreos-metadata[2015]: Jul 02 00:46:43.490 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Jul 2 00:46:43.491242 coreos-metadata[2015]: Jul 02 00:46:43.491 INFO Fetch successful Jul 2 00:46:43.491503 coreos-metadata[2015]: Jul 02 00:46:43.491 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Jul 2 00:46:43.491850 coreos-metadata[2015]: Jul 02 00:46:43.491 INFO Fetch successful Jul 2 00:46:43.492107 coreos-metadata[2015]: Jul 02 00:46:43.491 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Jul 2 00:46:43.492407 coreos-metadata[2015]: Jul 02 00:46:43.492 INFO Fetch successful Jul 2 00:46:43.492705 coreos-metadata[2015]: Jul 02 00:46:43.492 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Jul 2 00:46:43.492964 coreos-metadata[2015]: Jul 02 00:46:43.492 INFO Fetch successful Jul 2 00:46:43.493216 coreos-metadata[2015]: Jul 02 00:46:43.493 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Jul 2 00:46:43.493473 coreos-metadata[2015]: Jul 02 00:46:43.493 INFO Fetch successful Jul 2 00:46:43.493755 coreos-metadata[2015]: Jul 02 00:46:43.493 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Jul 2 00:46:43.494149 coreos-metadata[2015]: Jul 02 00:46:43.493 INFO Fetch successful Jul 2 00:46:43.494413 coreos-metadata[2015]: Jul 02 00:46:43.494 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Jul 2 00:46:43.494777 coreos-metadata[2015]: Jul 02 00:46:43.494 INFO Fetch successful Jul 2 00:46:43.508694 systemd[1]: Finished coreos-metadata.service. Jul 2 00:46:43.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:44.562938 systemd[1]: Stopped kubelet.service. Jul 2 00:46:44.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:44.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:44.563437 systemd[1]: kubelet.service: Consumed 1.440s CPU time. Jul 2 00:46:44.567667 systemd[1]: Starting kubelet.service... Jul 2 00:46:44.602124 systemd[1]: Reloading. Jul 2 00:46:44.734665 /usr/lib/systemd/system-generators/torcx-generator[2075]: time="2024-07-02T00:46:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:46:44.734730 /usr/lib/systemd/system-generators/torcx-generator[2075]: time="2024-07-02T00:46:44Z" level=info msg="torcx already run" Jul 2 00:46:44.934335 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:46:44.934375 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:46:44.975955 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.137000 audit: BPF prog-id=46 op=LOAD Jul 2 00:46:45.137000 audit: BPF prog-id=27 op=UNLOAD Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit: BPF prog-id=47 op=LOAD Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.138000 audit: BPF prog-id=48 op=LOAD Jul 2 00:46:45.138000 audit: BPF prog-id=28 op=UNLOAD Jul 2 00:46:45.138000 audit: BPF prog-id=29 op=UNLOAD Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit: BPF prog-id=49 op=LOAD Jul 2 00:46:45.139000 audit: BPF prog-id=41 op=UNLOAD Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit: BPF prog-id=50 op=LOAD Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.140000 audit: BPF prog-id=51 op=LOAD Jul 2 00:46:45.140000 audit: BPF prog-id=42 op=UNLOAD Jul 2 00:46:45.140000 audit: BPF prog-id=43 op=UNLOAD Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit: BPF prog-id=52 op=LOAD Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.142000 audit: BPF prog-id=53 op=LOAD Jul 2 00:46:45.142000 audit: BPF prog-id=30 op=UNLOAD Jul 2 00:46:45.142000 audit: BPF prog-id=31 op=UNLOAD Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit: BPF prog-id=54 op=LOAD Jul 2 00:46:45.144000 audit: BPF prog-id=32 op=UNLOAD Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit: BPF prog-id=55 op=LOAD Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.144000 audit: BPF prog-id=56 op=LOAD Jul 2 00:46:45.144000 audit: BPF prog-id=33 op=UNLOAD Jul 2 00:46:45.144000 audit: BPF prog-id=34 op=UNLOAD Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.151000 audit: BPF prog-id=57 op=LOAD Jul 2 00:46:45.151000 audit: BPF prog-id=37 op=UNLOAD Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.152000 audit: BPF prog-id=58 op=LOAD Jul 2 00:46:45.152000 audit: BPF prog-id=36 op=UNLOAD Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.156000 audit: BPF prog-id=59 op=LOAD Jul 2 00:46:45.156000 audit: BPF prog-id=35 op=UNLOAD Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit: BPF prog-id=60 op=LOAD Jul 2 00:46:45.158000 audit: BPF prog-id=38 op=UNLOAD Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit: BPF prog-id=61 op=LOAD Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.158000 audit: BPF prog-id=62 op=LOAD Jul 2 00:46:45.158000 audit: BPF prog-id=39 op=UNLOAD Jul 2 00:46:45.158000 audit: BPF prog-id=40 op=UNLOAD Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:45.163000 audit: BPF prog-id=63 op=LOAD Jul 2 00:46:45.163000 audit: BPF prog-id=44 op=UNLOAD Jul 2 00:46:45.192102 systemd[1]: Started kubelet.service. Jul 2 00:46:45.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:45.205276 systemd[1]: Stopping kubelet.service... Jul 2 00:46:45.206083 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 00:46:45.206455 systemd[1]: Stopped kubelet.service. Jul 2 00:46:45.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:45.209740 systemd[1]: Starting kubelet.service... Jul 2 00:46:45.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:45.618872 systemd[1]: Started kubelet.service. Jul 2 00:46:45.712025 kubelet[2141]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:46:45.712025 kubelet[2141]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 00:46:45.712025 kubelet[2141]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:46:45.713762 kubelet[2141]: I0702 00:46:45.713672 2141 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 00:46:46.847570 kubelet[2141]: I0702 00:46:46.847525 2141 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 00:46:46.848306 kubelet[2141]: I0702 00:46:46.848282 2141 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 00:46:46.848774 kubelet[2141]: I0702 00:46:46.848748 2141 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 00:46:46.885040 kubelet[2141]: I0702 00:46:46.884987 2141 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:46:46.905608 kubelet[2141]: I0702 00:46:46.905523 2141 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 00:46:46.906327 kubelet[2141]: I0702 00:46:46.906271 2141 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 00:46:46.907950 kubelet[2141]: I0702 00:46:46.907662 2141 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.22.71","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 00:46:46.908217 kubelet[2141]: I0702 00:46:46.907975 2141 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 00:46:46.908217 kubelet[2141]: I0702 00:46:46.907997 2141 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 00:46:46.908364 kubelet[2141]: I0702 00:46:46.908240 2141 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:46:46.909626 kubelet[2141]: I0702 00:46:46.909549 2141 kubelet.go:400] "Attempting to sync node with API server" Jul 2 00:46:46.910058 kubelet[2141]: I0702 00:46:46.910026 2141 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 00:46:46.910239 kubelet[2141]: I0702 00:46:46.910160 2141 kubelet.go:312] "Adding apiserver pod source" Jul 2 00:46:46.910239 kubelet[2141]: I0702 00:46:46.910230 2141 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 00:46:46.911157 kubelet[2141]: E0702 00:46:46.911120 2141 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:46.911288 kubelet[2141]: E0702 00:46:46.911221 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:46.912495 kubelet[2141]: I0702 00:46:46.912454 2141 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 00:46:46.912893 kubelet[2141]: I0702 00:46:46.912865 2141 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 00:46:46.912987 kubelet[2141]: W0702 00:46:46.912956 2141 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 00:46:46.914134 kubelet[2141]: I0702 00:46:46.914096 2141 server.go:1264] "Started kubelet" Jul 2 00:46:46.923261 kubelet[2141]: I0702 00:46:46.923198 2141 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 00:46:46.926508 kubelet[2141]: I0702 00:46:46.926381 2141 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 00:46:46.927005 kubelet[2141]: I0702 00:46:46.926960 2141 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 00:46:46.928948 kubelet[2141]: I0702 00:46:46.928916 2141 server.go:455] "Adding debug handlers to kubelet server" Jul 2 00:46:46.933707 kubelet[2141]: E0702 00:46:46.933656 2141 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 00:46:46.933000 audit[2141]: AVC avc: denied { mac_admin } for pid=2141 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:46.933000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:46:46.933000 audit[2141]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000526f0 a1=4000bb7710 a2=40000526c0 a3=25 items=0 ppid=1 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:46.933000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:46:46.936085 kubelet[2141]: I0702 00:46:46.936038 2141 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 00:46:46.934000 audit[2141]: AVC avc: denied { mac_admin } for pid=2141 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:46.934000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:46:46.934000 audit[2141]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400065baa0 a1=4000bb7728 a2=4000052810 a3=25 items=0 ppid=1 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:46.934000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:46:46.936712 kubelet[2141]: I0702 00:46:46.936678 2141 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 00:46:46.937042 kubelet[2141]: I0702 00:46:46.937020 2141 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 00:46:46.941799 kubelet[2141]: I0702 00:46:46.941756 2141 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 00:46:46.942310 kubelet[2141]: I0702 00:46:46.942279 2141 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 00:46:46.942588 kubelet[2141]: I0702 00:46:46.942543 2141 reconciler.go:26] "Reconciler: start to sync state" Jul 2 00:46:46.944066 kubelet[2141]: I0702 00:46:46.944032 2141 factory.go:221] Registration of the systemd container factory successfully Jul 2 00:46:46.944442 kubelet[2141]: I0702 00:46:46.944408 2141 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 00:46:46.946895 kubelet[2141]: I0702 00:46:46.946861 2141 factory.go:221] Registration of the containerd container factory successfully Jul 2 00:46:46.964352 kubelet[2141]: W0702 00:46:46.964295 2141 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.22.71" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 00:46:46.964534 kubelet[2141]: E0702 00:46:46.964375 2141 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.22.71" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 00:46:46.964534 kubelet[2141]: W0702 00:46:46.964487 2141 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 00:46:46.964737 kubelet[2141]: E0702 00:46:46.964540 2141 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 00:46:46.964737 kubelet[2141]: W0702 00:46:46.964705 2141 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 00:46:46.964737 kubelet[2141]: E0702 00:46:46.964732 2141 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 00:46:46.968355 kubelet[2141]: E0702 00:46:46.968305 2141 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.71\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 2 00:46:46.969704 kubelet[2141]: E0702 00:46:46.964804 2141 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.22.71.17de3ed869fb53c4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.22.71,UID:172.31.22.71,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.22.71,},FirstTimestamp:2024-07-02 00:46:46.914044868 +0000 UTC m=+1.285975778,LastTimestamp:2024-07-02 00:46:46.914044868 +0000 UTC m=+1.285975778,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.22.71,}" Jul 2 00:46:46.972677 kubelet[2141]: E0702 00:46:46.972490 2141 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.22.71.17de3ed86b263106 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.22.71,UID:172.31.22.71,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.22.71,},FirstTimestamp:2024-07-02 00:46:46.933631238 +0000 UTC m=+1.305562184,LastTimestamp:2024-07-02 00:46:46.933631238 +0000 UTC m=+1.305562184,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.22.71,}" Jul 2 00:46:46.982139 kubelet[2141]: I0702 00:46:46.982102 2141 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 00:46:46.982406 kubelet[2141]: I0702 00:46:46.982372 2141 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 00:46:46.982750 kubelet[2141]: I0702 00:46:46.982665 2141 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:46:46.988743 kubelet[2141]: I0702 00:46:46.988708 2141 policy_none.go:49] "None policy: Start" Jul 2 00:46:46.992083 kubelet[2141]: I0702 00:46:46.992046 2141 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 00:46:46.992289 kubelet[2141]: I0702 00:46:46.992267 2141 state_mem.go:35] "Initializing new in-memory state store" Jul 2 00:46:47.002752 systemd[1]: Created slice kubepods.slice. Jul 2 00:46:47.004000 audit[2158]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.004000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe4c7d050 a2=0 a3=1 items=0 ppid=2141 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:46:47.008000 audit[2160]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.008000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff44e8880 a2=0 a3=1 items=0 ppid=2141 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:46:47.018565 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 00:46:47.030621 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 00:46:47.039509 kubelet[2141]: I0702 00:46:47.039470 2141 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 00:46:47.039000 audit[2141]: AVC avc: denied { mac_admin } for pid=2141 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:47.039000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:46:47.039000 audit[2141]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d582a0 a1=4000d4dc50 a2=4000d58270 a3=25 items=0 ppid=1 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.039000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:46:47.040445 kubelet[2141]: I0702 00:46:47.040373 2141 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 00:46:47.042457 kubelet[2141]: I0702 00:46:47.040822 2141 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 00:46:47.042457 kubelet[2141]: I0702 00:46:47.041053 2141 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 00:46:47.044724 kubelet[2141]: I0702 00:46:47.044598 2141 kubelet_node_status.go:73] "Attempting to register node" node="172.31.22.71" Jul 2 00:46:47.016000 audit[2162]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.016000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe8440160 a2=0 a3=1 items=0 ppid=2141 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:46:47.047960 kubelet[2141]: E0702 00:46:47.047914 2141 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.22.71\" not found" Jul 2 00:46:47.053000 audit[2167]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.053000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcdd72f20 a2=0 a3=1 items=0 ppid=2141 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:46:47.054617 kubelet[2141]: I0702 00:46:47.054282 2141 kubelet_node_status.go:76] "Successfully registered node" node="172.31.22.71" Jul 2 00:46:47.094178 kubelet[2141]: E0702 00:46:47.094111 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.128000 audit[2172]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.128000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc5e478e0 a2=0 a3=1 items=0 ppid=2141 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.131358 kubelet[2141]: I0702 00:46:47.131311 2141 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 00:46:47.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 00:46:47.131000 audit[2173]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:47.131000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffca2b6ca0 a2=0 a3=1 items=0 ppid=2141 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:46:47.134366 kubelet[2141]: I0702 00:46:47.134315 2141 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 00:46:47.134580 kubelet[2141]: I0702 00:46:47.134537 2141 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 00:46:47.134721 kubelet[2141]: I0702 00:46:47.134700 2141 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 00:46:47.134938 kubelet[2141]: E0702 00:46:47.134911 2141 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 00:46:47.134000 audit[2174]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.134000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd89930f0 a2=0 a3=1 items=0 ppid=2141 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:46:47.137000 audit[2175]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:47.137000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1fec320 a2=0 a3=1 items=0 ppid=2141 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:46:47.139000 audit[2176]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.139000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcd719a00 a2=0 a3=1 items=0 ppid=2141 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:46:47.140000 audit[2177]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:47.140000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdf012440 a2=0 a3=1 items=0 ppid=2141 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:46:47.145000 audit[2178]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:47.145000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeb8a9780 a2=0 a3=1 items=0 ppid=2141 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:46:47.146000 audit[2179]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:47.146000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0130760 a2=0 a3=1 items=0 ppid=2141 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:47.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:46:47.194798 kubelet[2141]: E0702 00:46:47.194748 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.213542 sudo[2011]: pam_unix(sudo:session): session closed for user root Jul 2 00:46:47.213000 audit[2011]: USER_END pid=2011 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:47.213000 audit[2011]: CRED_DISP pid=2011 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:46:47.236857 sshd[2008]: pam_unix(sshd:session): session closed for user core Jul 2 00:46:47.238000 audit[2008]: USER_END pid=2008 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.239000 audit[2008]: CRED_DISP pid=2008 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Jul 2 00:46:47.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.71:22-139.178.89.65:39280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:46:47.242996 systemd[1]: sshd@6-172.31.22.71:22-139.178.89.65:39280.service: Deactivated successfully. Jul 2 00:46:47.244214 systemd-logind[1732]: Session 7 logged out. Waiting for processes to exit. Jul 2 00:46:47.244235 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 00:46:47.246834 systemd-logind[1732]: Removed session 7. Jul 2 00:46:47.295929 kubelet[2141]: E0702 00:46:47.295870 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.396119 kubelet[2141]: E0702 00:46:47.395976 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.496308 kubelet[2141]: E0702 00:46:47.496249 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.597330 kubelet[2141]: E0702 00:46:47.597291 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.698367 kubelet[2141]: E0702 00:46:47.698224 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.799139 kubelet[2141]: E0702 00:46:47.799091 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.853888 kubelet[2141]: I0702 00:46:47.853853 2141 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 00:46:47.854642 kubelet[2141]: W0702 00:46:47.854615 2141 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 2 00:46:47.899451 kubelet[2141]: E0702 00:46:47.899378 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:47.911733 kubelet[2141]: E0702 00:46:47.911684 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:48.000478 kubelet[2141]: E0702 00:46:48.000349 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:48.100953 kubelet[2141]: E0702 00:46:48.100874 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:48.201939 kubelet[2141]: E0702 00:46:48.201850 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:48.302780 kubelet[2141]: E0702 00:46:48.302634 2141 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.71\" not found" Jul 2 00:46:48.404226 kubelet[2141]: I0702 00:46:48.404190 2141 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 00:46:48.405117 env[1741]: time="2024-07-02T00:46:48.405023879Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 00:46:48.405733 kubelet[2141]: I0702 00:46:48.405564 2141 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 00:46:48.605774 amazon-ssm-agent[1765]: 2024-07-02 00:46:48 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Jul 2 00:46:48.912652 kubelet[2141]: E0702 00:46:48.912128 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:48.912652 kubelet[2141]: I0702 00:46:48.912204 2141 apiserver.go:52] "Watching apiserver" Jul 2 00:46:48.919549 kubelet[2141]: I0702 00:46:48.919485 2141 topology_manager.go:215] "Topology Admit Handler" podUID="eca117be-7c5e-4e93-b40a-dc3d2aef4dd8" podNamespace="kube-system" podName="kube-proxy-8sn56" Jul 2 00:46:48.919773 kubelet[2141]: I0702 00:46:48.919640 2141 topology_manager.go:215] "Topology Admit Handler" podUID="10ab867e-b2e5-45c6-98b3-2ab8493f426c" podNamespace="calico-system" podName="calico-node-45sx2" Jul 2 00:46:48.919843 kubelet[2141]: I0702 00:46:48.919786 2141 topology_manager.go:215] "Topology Admit Handler" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" podNamespace="calico-system" podName="csi-node-driver-79tnn" Jul 2 00:46:48.920064 kubelet[2141]: E0702 00:46:48.920013 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:46:48.933986 systemd[1]: Created slice kubepods-besteffort-podeca117be_7c5e_4e93_b40a_dc3d2aef4dd8.slice. Jul 2 00:46:48.943209 kubelet[2141]: I0702 00:46:48.943163 2141 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 00:46:48.957461 kubelet[2141]: I0702 00:46:48.956792 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-flexvol-driver-host\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.957461 kubelet[2141]: I0702 00:46:48.956868 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/eca117be-7c5e-4e93-b40a-dc3d2aef4dd8-kube-proxy\") pod \"kube-proxy-8sn56\" (UID: \"eca117be-7c5e-4e93-b40a-dc3d2aef4dd8\") " pod="kube-system/kube-proxy-8sn56" Jul 2 00:46:48.957461 kubelet[2141]: I0702 00:46:48.956916 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eca117be-7c5e-4e93-b40a-dc3d2aef4dd8-xtables-lock\") pod \"kube-proxy-8sn56\" (UID: \"eca117be-7c5e-4e93-b40a-dc3d2aef4dd8\") " pod="kube-system/kube-proxy-8sn56" Jul 2 00:46:48.957461 kubelet[2141]: I0702 00:46:48.956952 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-var-lib-calico\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.957461 kubelet[2141]: I0702 00:46:48.956988 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-cni-net-dir\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.957181 systemd[1]: Created slice kubepods-besteffort-pod10ab867e_b2e5_45c6_98b3_2ab8493f426c.slice. Jul 2 00:46:48.957989 kubelet[2141]: I0702 00:46:48.957022 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eca117be-7c5e-4e93-b40a-dc3d2aef4dd8-lib-modules\") pod \"kube-proxy-8sn56\" (UID: \"eca117be-7c5e-4e93-b40a-dc3d2aef4dd8\") " pod="kube-system/kube-proxy-8sn56" Jul 2 00:46:48.957989 kubelet[2141]: I0702 00:46:48.957060 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/10ab867e-b2e5-45c6-98b3-2ab8493f426c-tigera-ca-bundle\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.957989 kubelet[2141]: I0702 00:46:48.957095 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/34f91864-803a-4e5e-82f4-cff9840978a8-kubelet-dir\") pod \"csi-node-driver-79tnn\" (UID: \"34f91864-803a-4e5e-82f4-cff9840978a8\") " pod="calico-system/csi-node-driver-79tnn" Jul 2 00:46:48.957989 kubelet[2141]: I0702 00:46:48.957130 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/34f91864-803a-4e5e-82f4-cff9840978a8-registration-dir\") pod \"csi-node-driver-79tnn\" (UID: \"34f91864-803a-4e5e-82f4-cff9840978a8\") " pod="calico-system/csi-node-driver-79tnn" Jul 2 00:46:48.957989 kubelet[2141]: I0702 00:46:48.957917 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/34f91864-803a-4e5e-82f4-cff9840978a8-varrun\") pod \"csi-node-driver-79tnn\" (UID: \"34f91864-803a-4e5e-82f4-cff9840978a8\") " pod="calico-system/csi-node-driver-79tnn" Jul 2 00:46:48.958362 kubelet[2141]: I0702 00:46:48.957992 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vjr5l\" (UniqueName: \"kubernetes.io/projected/34f91864-803a-4e5e-82f4-cff9840978a8-kube-api-access-vjr5l\") pod \"csi-node-driver-79tnn\" (UID: \"34f91864-803a-4e5e-82f4-cff9840978a8\") " pod="calico-system/csi-node-driver-79tnn" Jul 2 00:46:48.958362 kubelet[2141]: I0702 00:46:48.958037 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-xtables-lock\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.958362 kubelet[2141]: I0702 00:46:48.958078 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-var-run-calico\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.958362 kubelet[2141]: I0702 00:46:48.958130 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-cni-bin-dir\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.958362 kubelet[2141]: I0702 00:46:48.958166 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q2wwk\" (UniqueName: \"kubernetes.io/projected/10ab867e-b2e5-45c6-98b3-2ab8493f426c-kube-api-access-q2wwk\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.958717 kubelet[2141]: I0702 00:46:48.958201 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-cni-log-dir\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.958717 kubelet[2141]: I0702 00:46:48.958244 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/34f91864-803a-4e5e-82f4-cff9840978a8-socket-dir\") pod \"csi-node-driver-79tnn\" (UID: \"34f91864-803a-4e5e-82f4-cff9840978a8\") " pod="calico-system/csi-node-driver-79tnn" Jul 2 00:46:48.958717 kubelet[2141]: I0702 00:46:48.958283 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-48qzz\" (UniqueName: \"kubernetes.io/projected/eca117be-7c5e-4e93-b40a-dc3d2aef4dd8-kube-api-access-48qzz\") pod \"kube-proxy-8sn56\" (UID: \"eca117be-7c5e-4e93-b40a-dc3d2aef4dd8\") " pod="kube-system/kube-proxy-8sn56" Jul 2 00:46:48.958717 kubelet[2141]: I0702 00:46:48.958318 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-lib-modules\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.958717 kubelet[2141]: I0702 00:46:48.958352 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/10ab867e-b2e5-45c6-98b3-2ab8493f426c-policysync\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:48.958996 kubelet[2141]: I0702 00:46:48.958393 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/10ab867e-b2e5-45c6-98b3-2ab8493f426c-node-certs\") pod \"calico-node-45sx2\" (UID: \"10ab867e-b2e5-45c6-98b3-2ab8493f426c\") " pod="calico-system/calico-node-45sx2" Jul 2 00:46:49.063134 kubelet[2141]: E0702 00:46:49.063091 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.063399 kubelet[2141]: W0702 00:46:49.063364 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.063627 kubelet[2141]: E0702 00:46:49.063598 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.064705 kubelet[2141]: E0702 00:46:49.064654 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.064705 kubelet[2141]: W0702 00:46:49.064691 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.064956 kubelet[2141]: E0702 00:46:49.064737 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.077896 kubelet[2141]: E0702 00:46:49.066808 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.077896 kubelet[2141]: W0702 00:46:49.066847 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.077896 kubelet[2141]: E0702 00:46:49.067013 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.077896 kubelet[2141]: E0702 00:46:49.067240 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.077896 kubelet[2141]: W0702 00:46:49.067257 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.077896 kubelet[2141]: E0702 00:46:49.067404 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.077896 kubelet[2141]: E0702 00:46:49.067665 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.077896 kubelet[2141]: W0702 00:46:49.067681 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.077896 kubelet[2141]: E0702 00:46:49.067853 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.077896 kubelet[2141]: E0702 00:46:49.068044 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.078555 kubelet[2141]: W0702 00:46:49.068059 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.078555 kubelet[2141]: E0702 00:46:49.068176 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.078555 kubelet[2141]: E0702 00:46:49.068371 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.078555 kubelet[2141]: W0702 00:46:49.068386 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.078555 kubelet[2141]: E0702 00:46:49.068505 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.078555 kubelet[2141]: E0702 00:46:49.068732 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.078555 kubelet[2141]: W0702 00:46:49.068748 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.078555 kubelet[2141]: E0702 00:46:49.068870 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.078555 kubelet[2141]: E0702 00:46:49.069041 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.078555 kubelet[2141]: W0702 00:46:49.069055 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.079234 kubelet[2141]: E0702 00:46:49.069167 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.079234 kubelet[2141]: E0702 00:46:49.069388 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.079234 kubelet[2141]: W0702 00:46:49.069403 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.079234 kubelet[2141]: E0702 00:46:49.069520 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.079234 kubelet[2141]: E0702 00:46:49.069741 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.079234 kubelet[2141]: W0702 00:46:49.069758 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.079234 kubelet[2141]: E0702 00:46:49.069884 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.079234 kubelet[2141]: E0702 00:46:49.070061 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.079234 kubelet[2141]: W0702 00:46:49.070076 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.079234 kubelet[2141]: E0702 00:46:49.070193 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.079804 kubelet[2141]: E0702 00:46:49.070373 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.079804 kubelet[2141]: W0702 00:46:49.070388 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.079804 kubelet[2141]: E0702 00:46:49.070526 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.079804 kubelet[2141]: E0702 00:46:49.070972 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.079804 kubelet[2141]: W0702 00:46:49.070991 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.079804 kubelet[2141]: E0702 00:46:49.071135 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.079804 kubelet[2141]: E0702 00:46:49.071633 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.079804 kubelet[2141]: W0702 00:46:49.071653 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.079804 kubelet[2141]: E0702 00:46:49.071809 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.079804 kubelet[2141]: E0702 00:46:49.072045 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.080327 kubelet[2141]: W0702 00:46:49.072061 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.080327 kubelet[2141]: E0702 00:46:49.072189 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.080327 kubelet[2141]: E0702 00:46:49.072411 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.080327 kubelet[2141]: W0702 00:46:49.072427 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.080327 kubelet[2141]: E0702 00:46:49.072615 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.080327 kubelet[2141]: E0702 00:46:49.072832 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.080327 kubelet[2141]: W0702 00:46:49.072848 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.080327 kubelet[2141]: E0702 00:46:49.072997 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.080327 kubelet[2141]: E0702 00:46:49.073199 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.080327 kubelet[2141]: W0702 00:46:49.073215 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.080955 kubelet[2141]: E0702 00:46:49.073359 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.080955 kubelet[2141]: E0702 00:46:49.073542 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.080955 kubelet[2141]: W0702 00:46:49.073557 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.080955 kubelet[2141]: E0702 00:46:49.073619 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.080955 kubelet[2141]: E0702 00:46:49.073925 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.080955 kubelet[2141]: W0702 00:46:49.073941 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.080955 kubelet[2141]: E0702 00:46:49.073960 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.080955 kubelet[2141]: E0702 00:46:49.079369 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.080955 kubelet[2141]: W0702 00:46:49.079423 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.080955 kubelet[2141]: E0702 00:46:49.079458 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.094420 kubelet[2141]: E0702 00:46:49.093242 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.094420 kubelet[2141]: W0702 00:46:49.093283 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.094420 kubelet[2141]: E0702 00:46:49.093318 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.094420 kubelet[2141]: E0702 00:46:49.094279 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.094420 kubelet[2141]: W0702 00:46:49.094301 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.094420 kubelet[2141]: E0702 00:46:49.094327 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.106631 kubelet[2141]: E0702 00:46:49.106281 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:49.106631 kubelet[2141]: W0702 00:46:49.106319 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:49.106631 kubelet[2141]: E0702 00:46:49.106354 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:49.255841 env[1741]: time="2024-07-02T00:46:49.253148301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8sn56,Uid:eca117be-7c5e-4e93-b40a-dc3d2aef4dd8,Namespace:kube-system,Attempt:0,}" Jul 2 00:46:49.268043 env[1741]: time="2024-07-02T00:46:49.267973999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-45sx2,Uid:10ab867e-b2e5-45c6-98b3-2ab8493f426c,Namespace:calico-system,Attempt:0,}" Jul 2 00:46:49.850682 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount134024297.mount: Deactivated successfully. Jul 2 00:46:49.863790 env[1741]: time="2024-07-02T00:46:49.863722442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.869772 env[1741]: time="2024-07-02T00:46:49.869705757Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.872943 env[1741]: time="2024-07-02T00:46:49.872880229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.876807 env[1741]: time="2024-07-02T00:46:49.876744889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.880016 env[1741]: time="2024-07-02T00:46:49.879970416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.883452 env[1741]: time="2024-07-02T00:46:49.883387829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.885686 env[1741]: time="2024-07-02T00:46:49.885589452Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.893677 env[1741]: time="2024-07-02T00:46:49.891392182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:49.913144 kubelet[2141]: E0702 00:46:49.913072 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:49.933037 env[1741]: time="2024-07-02T00:46:49.932890028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:46:49.933037 env[1741]: time="2024-07-02T00:46:49.932985982Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:46:49.933281 env[1741]: time="2024-07-02T00:46:49.933012956Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:46:49.933404 env[1741]: time="2024-07-02T00:46:49.933264799Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b628d01d158cb8e0ea513852dfb8f4fae6a685e10a35c94be9c20c4878ce4353 pid=2218 runtime=io.containerd.runc.v2 Jul 2 00:46:49.937763 env[1741]: time="2024-07-02T00:46:49.937649398Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:46:49.938106 env[1741]: time="2024-07-02T00:46:49.938013159Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:46:49.938311 env[1741]: time="2024-07-02T00:46:49.938249257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:46:49.938779 env[1741]: time="2024-07-02T00:46:49.938716105Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694 pid=2229 runtime=io.containerd.runc.v2 Jul 2 00:46:49.966093 systemd[1]: Started cri-containerd-b628d01d158cb8e0ea513852dfb8f4fae6a685e10a35c94be9c20c4878ce4353.scope. Jul 2 00:46:49.986913 systemd[1]: Started cri-containerd-2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694.scope. Jul 2 00:46:50.018857 kernel: kauditd_printk_skb: 276 callbacks suppressed Jul 2 00:46:50.019004 kernel: audit: type=1400 audit(1719881210.009:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.026864 kernel: audit: type=1400 audit(1719881210.009:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.035850 kernel: audit: type=1400 audit(1719881210.009:454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.045651 kernel: audit: type=1400 audit(1719881210.009:455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.052406 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 00:46:50.058883 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 00:46:50.058961 kernel: audit: type=1400 audit(1719881210.009:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.059009 kernel: audit: backlog limit exceeded Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.074631 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 00:46:50.074749 kernel: audit: type=1400 audit(1719881210.009:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.011000 audit: BPF prog-id=64 op=LOAD Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2218 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:50.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323864303164313538636238653065613531333835326466623866 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2218 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:50.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323864303164313538636238653065613531333835326466623866 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit: BPF prog-id=65 op=LOAD Jul 2 00:46:50.018000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2218 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:50.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323864303164313538636238653065613531333835326466623866 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit: BPF prog-id=66 op=LOAD Jul 2 00:46:50.018000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2218 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:50.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323864303164313538636238653065613531333835326466623866 Jul 2 00:46:50.018000 audit: BPF prog-id=66 op=UNLOAD Jul 2 00:46:50.018000 audit: BPF prog-id=65 op=UNLOAD Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.018000 audit: BPF prog-id=67 op=LOAD Jul 2 00:46:50.018000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2218 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:50.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323864303164313538636238653065613531333835326466623866 Jul 2 00:46:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:50.062000 audit: BPF prog-id=68 op=LOAD Jul 2 00:46:50.106319 env[1741]: time="2024-07-02T00:46:50.102932981Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8sn56,Uid:eca117be-7c5e-4e93-b40a-dc3d2aef4dd8,Namespace:kube-system,Attempt:0,} returns sandbox id \"b628d01d158cb8e0ea513852dfb8f4fae6a685e10a35c94be9c20c4878ce4353\"" Jul 2 00:46:50.109780 env[1741]: time="2024-07-02T00:46:50.109730008Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 00:46:50.125801 env[1741]: time="2024-07-02T00:46:50.125742217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-45sx2,Uid:10ab867e-b2e5-45c6-98b3-2ab8493f426c,Namespace:calico-system,Attempt:0,} returns sandbox id \"2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694\"" Jul 2 00:46:50.136077 kubelet[2141]: E0702 00:46:50.135638 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:46:50.913696 kubelet[2141]: E0702 00:46:50.913647 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:51.779686 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3179025510.mount: Deactivated successfully. Jul 2 00:46:51.914536 kubelet[2141]: E0702 00:46:51.914448 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:52.135745 kubelet[2141]: E0702 00:46:52.135417 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:46:52.644115 env[1741]: time="2024-07-02T00:46:52.644024321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:52.646888 env[1741]: time="2024-07-02T00:46:52.646831708Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:52.651333 env[1741]: time="2024-07-02T00:46:52.651268526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:52.655732 env[1741]: time="2024-07-02T00:46:52.655668298Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:52.656958 env[1741]: time="2024-07-02T00:46:52.656886550Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae\"" Jul 2 00:46:52.661907 env[1741]: time="2024-07-02T00:46:52.661850889Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 00:46:52.663758 env[1741]: time="2024-07-02T00:46:52.663672149Z" level=info msg="CreateContainer within sandbox \"b628d01d158cb8e0ea513852dfb8f4fae6a685e10a35c94be9c20c4878ce4353\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 00:46:52.689128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2312463092.mount: Deactivated successfully. Jul 2 00:46:52.713962 env[1741]: time="2024-07-02T00:46:52.713896556Z" level=info msg="CreateContainer within sandbox \"b628d01d158cb8e0ea513852dfb8f4fae6a685e10a35c94be9c20c4878ce4353\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7dc2f9278bfac44807a9874744522f5d318626debbdcbcee1f59f873b3ad5c5c\"" Jul 2 00:46:52.715711 env[1741]: time="2024-07-02T00:46:52.715643581Z" level=info msg="StartContainer for \"7dc2f9278bfac44807a9874744522f5d318626debbdcbcee1f59f873b3ad5c5c\"" Jul 2 00:46:52.748190 systemd[1]: Started cri-containerd-7dc2f9278bfac44807a9874744522f5d318626debbdcbcee1f59f873b3ad5c5c.scope. Jul 2 00:46:52.790000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.790000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2218 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633266393237386266616334343830376139383734373434353232 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit: BPF prog-id=72 op=LOAD Jul 2 00:46:52.791000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2218 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633266393237386266616334343830376139383734373434353232 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit: BPF prog-id=73 op=LOAD Jul 2 00:46:52.791000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2218 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633266393237386266616334343830376139383734373434353232 Jul 2 00:46:52.791000 audit: BPF prog-id=73 op=UNLOAD Jul 2 00:46:52.791000 audit: BPF prog-id=72 op=UNLOAD Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:52.791000 audit: BPF prog-id=74 op=LOAD Jul 2 00:46:52.791000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2218 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633266393237386266616334343830376139383734373434353232 Jul 2 00:46:52.825493 env[1741]: time="2024-07-02T00:46:52.825399152Z" level=info msg="StartContainer for \"7dc2f9278bfac44807a9874744522f5d318626debbdcbcee1f59f873b3ad5c5c\" returns successfully" Jul 2 00:46:52.914917 kubelet[2141]: E0702 00:46:52.914660 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:52.963000 audit[2351]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:52.963000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd68e650 a2=0 a3=1 items=0 ppid=2311 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:46:52.966000 audit[2352]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:52.966000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffea32a60 a2=0 a3=1 items=0 ppid=2311 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:46:52.968000 audit[2353]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:52.968000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd84f0c30 a2=0 a3=1 items=0 ppid=2311 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:46:52.977000 audit[2354]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:52.977000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2f10220 a2=0 a3=1 items=0 ppid=2311 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:46:52.981000 audit[2355]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:52.981000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd98e4810 a2=0 a3=1 items=0 ppid=2311 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:46:52.987000 audit[2356]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:52.987000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe37ed320 a2=0 a3=1 items=0 ppid=2311 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:52.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:46:53.082000 audit[2357]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.082000 audit[2357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe1739740 a2=0 a3=1 items=0 ppid=2311 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:46:53.090000 audit[2359]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.090000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff94947d0 a2=0 a3=1 items=0 ppid=2311 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 00:46:53.099000 audit[2362]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.099000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5e60020 a2=0 a3=1 items=0 ppid=2311 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 00:46:53.102000 audit[2363]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.102000 audit[2363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed8e8b90 a2=0 a3=1 items=0 ppid=2311 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:46:53.108000 audit[2365]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.108000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcd4edae0 a2=0 a3=1 items=0 ppid=2311 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:46:53.113000 audit[2366]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.113000 audit[2366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeabe3250 a2=0 a3=1 items=0 ppid=2311 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:46:53.119000 audit[2368]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.119000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdb944e20 a2=0 a3=1 items=0 ppid=2311 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:46:53.128000 audit[2371]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.128000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd5552f00 a2=0 a3=1 items=0 ppid=2311 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 00:46:53.131000 audit[2372]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.131000 audit[2372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc3d5e60 a2=0 a3=1 items=0 ppid=2311 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:46:53.149000 audit[2374]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.149000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdb642c90 a2=0 a3=1 items=0 ppid=2311 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:46:53.157000 audit[2375]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.157000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1d50270 a2=0 a3=1 items=0 ppid=2311 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:46:53.166000 audit[2377]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.166000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5b14b30 a2=0 a3=1 items=0 ppid=2311 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:46:53.170801 kubelet[2141]: I0702 00:46:53.170702 2141 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8sn56" podStartSLOduration=3.619104939 podStartE2EDuration="6.170679094s" podCreationTimestamp="2024-07-02 00:46:47 +0000 UTC" firstStartedPulling="2024-07-02 00:46:50.108426671 +0000 UTC m=+4.480357581" lastFinishedPulling="2024-07-02 00:46:52.660000753 +0000 UTC m=+7.031931736" observedRunningTime="2024-07-02 00:46:53.170167849 +0000 UTC m=+7.542098784" watchObservedRunningTime="2024-07-02 00:46:53.170679094 +0000 UTC m=+7.542610040" Jul 2 00:46:53.179000 audit[2380]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.179000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff1bb28d0 a2=0 a3=1 items=0 ppid=2311 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:46:53.181340 kubelet[2141]: E0702 00:46:53.181301 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.181533 kubelet[2141]: W0702 00:46:53.181495 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.181736 kubelet[2141]: E0702 00:46:53.181703 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.182357 kubelet[2141]: E0702 00:46:53.182316 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.182630 kubelet[2141]: W0702 00:46:53.182546 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.182838 kubelet[2141]: E0702 00:46:53.182807 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.183406 kubelet[2141]: E0702 00:46:53.183369 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.183647 kubelet[2141]: W0702 00:46:53.183612 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.183825 kubelet[2141]: E0702 00:46:53.183795 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.184417 kubelet[2141]: E0702 00:46:53.184383 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.184646 kubelet[2141]: W0702 00:46:53.184611 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.184840 kubelet[2141]: E0702 00:46:53.184811 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.187661 kubelet[2141]: E0702 00:46:53.187555 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.187875 kubelet[2141]: W0702 00:46:53.187838 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.188016 kubelet[2141]: E0702 00:46:53.187988 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.188688 kubelet[2141]: E0702 00:46:53.188650 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.188900 kubelet[2141]: W0702 00:46:53.188864 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.189095 kubelet[2141]: E0702 00:46:53.189065 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.189920 kubelet[2141]: E0702 00:46:53.189880 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.190132 kubelet[2141]: W0702 00:46:53.190096 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.190303 kubelet[2141]: E0702 00:46:53.190263 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.190930 kubelet[2141]: E0702 00:46:53.190892 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.191136 kubelet[2141]: W0702 00:46:53.191097 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.191349 kubelet[2141]: E0702 00:46:53.191309 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.192153 kubelet[2141]: E0702 00:46:53.192109 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.192402 kubelet[2141]: W0702 00:46:53.192359 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.192626 kubelet[2141]: E0702 00:46:53.192556 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.192000 audit[2390]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.192000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6fb2780 a2=0 a3=1 items=0 ppid=2311 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:46:53.193663 kubelet[2141]: E0702 00:46:53.193625 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.193868 kubelet[2141]: W0702 00:46:53.193828 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.194032 kubelet[2141]: E0702 00:46:53.194002 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.196109 kubelet[2141]: E0702 00:46:53.195806 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.196109 kubelet[2141]: W0702 00:46:53.195848 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.196109 kubelet[2141]: E0702 00:46:53.195886 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.195000 audit[2394]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.195000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc002af50 a2=0 a3=1 items=0 ppid=2311 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:46:53.197150 kubelet[2141]: E0702 00:46:53.196999 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.197150 kubelet[2141]: W0702 00:46:53.197040 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.197150 kubelet[2141]: E0702 00:46:53.197077 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.197682 kubelet[2141]: E0702 00:46:53.197544 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.197682 kubelet[2141]: W0702 00:46:53.197672 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.197896 kubelet[2141]: E0702 00:46:53.197705 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.198358 kubelet[2141]: E0702 00:46:53.198302 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.198358 kubelet[2141]: W0702 00:46:53.198344 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.198561 kubelet[2141]: E0702 00:46:53.198383 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.198994 kubelet[2141]: E0702 00:46:53.198949 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.198994 kubelet[2141]: W0702 00:46:53.198986 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.199207 kubelet[2141]: E0702 00:46:53.199019 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.199564 kubelet[2141]: E0702 00:46:53.199495 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.199737 kubelet[2141]: W0702 00:46:53.199551 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.199737 kubelet[2141]: E0702 00:46:53.199650 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.200301 kubelet[2141]: E0702 00:46:53.200235 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.200301 kubelet[2141]: W0702 00:46:53.200281 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.200520 kubelet[2141]: E0702 00:46:53.200318 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.200999 kubelet[2141]: E0702 00:46:53.200936 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.200999 kubelet[2141]: W0702 00:46:53.200981 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.201190 kubelet[2141]: E0702 00:46:53.201019 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.201563 kubelet[2141]: E0702 00:46:53.201502 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.201563 kubelet[2141]: W0702 00:46:53.201546 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.201783 kubelet[2141]: E0702 00:46:53.201650 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.202168 kubelet[2141]: E0702 00:46:53.202117 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.202168 kubelet[2141]: W0702 00:46:53.202155 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.202343 kubelet[2141]: E0702 00:46:53.202187 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.202914 kubelet[2141]: E0702 00:46:53.202856 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.202914 kubelet[2141]: W0702 00:46:53.202899 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.203153 kubelet[2141]: E0702 00:46:53.202935 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.203691 kubelet[2141]: E0702 00:46:53.203592 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.203847 kubelet[2141]: W0702 00:46:53.203681 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.203847 kubelet[2141]: E0702 00:46:53.203746 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.205109 kubelet[2141]: E0702 00:46:53.205050 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.205109 kubelet[2141]: W0702 00:46:53.205095 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.205364 kubelet[2141]: E0702 00:46:53.205142 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.205844 kubelet[2141]: E0702 00:46:53.205792 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.205844 kubelet[2141]: W0702 00:46:53.205831 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.206073 kubelet[2141]: E0702 00:46:53.206022 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.206423 kubelet[2141]: E0702 00:46:53.206371 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.206423 kubelet[2141]: W0702 00:46:53.206411 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.206709 kubelet[2141]: E0702 00:46:53.206454 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.207084 kubelet[2141]: E0702 00:46:53.207029 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.207084 kubelet[2141]: W0702 00:46:53.207068 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.207296 kubelet[2141]: E0702 00:46:53.207114 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.207748 kubelet[2141]: E0702 00:46:53.207685 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.207748 kubelet[2141]: W0702 00:46:53.207728 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.208010 kubelet[2141]: E0702 00:46:53.207959 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.208416 kubelet[2141]: E0702 00:46:53.208358 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.208416 kubelet[2141]: W0702 00:46:53.208399 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.208703 kubelet[2141]: E0702 00:46:53.208444 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.209662 kubelet[2141]: E0702 00:46:53.209028 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.209662 kubelet[2141]: W0702 00:46:53.209070 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.209662 kubelet[2141]: E0702 00:46:53.209114 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.210061 kubelet[2141]: E0702 00:46:53.209972 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.210061 kubelet[2141]: W0702 00:46:53.210014 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.210061 kubelet[2141]: E0702 00:46:53.210049 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.210630 kubelet[2141]: E0702 00:46:53.210528 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.210768 kubelet[2141]: W0702 00:46:53.210566 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.210768 kubelet[2141]: E0702 00:46:53.210691 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.211521 kubelet[2141]: E0702 00:46:53.211459 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:53.211521 kubelet[2141]: W0702 00:46:53.211501 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:53.211794 kubelet[2141]: E0702 00:46:53.211534 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:53.210000 audit[2409]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.210000 audit[2409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcbbe02a0 a2=0 a3=1 items=0 ppid=2311 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:46:53.248000 audit[2424]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.248000 audit[2424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffddedf490 a2=0 a3=1 items=0 ppid=2311 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:46:53.252000 audit[2425]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.252000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0946080 a2=0 a3=1 items=0 ppid=2311 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:46:53.260000 audit[2427]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:46:53.260000 audit[2427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd175b7a0 a2=0 a3=1 items=0 ppid=2311 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:46:53.300000 audit[2433]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:53.300000 audit[2433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe202fc90 a2=0 a3=1 items=0 ppid=2311 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:53.331000 audit[2433]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:53.331000 audit[2433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=ffffe202fc90 a2=0 a3=1 items=0 ppid=2311 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:53.334000 audit[2439]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.334000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd51a1bd0 a2=0 a3=1 items=0 ppid=2311 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:46:53.341000 audit[2441]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.341000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcfc00b60 a2=0 a3=1 items=0 ppid=2311 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 00:46:53.348000 audit[2444]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.348000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffef7068e0 a2=0 a3=1 items=0 ppid=2311 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.348000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 00:46:53.351000 audit[2445]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.351000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9f67df0 a2=0 a3=1 items=0 ppid=2311 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:46:53.357000 audit[2447]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.357000 audit[2447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcc8cf190 a2=0 a3=1 items=0 ppid=2311 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:46:53.361000 audit[2448]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.361000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffddf757a0 a2=0 a3=1 items=0 ppid=2311 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:46:53.367000 audit[2450]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.367000 audit[2450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcca6e030 a2=0 a3=1 items=0 ppid=2311 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 00:46:53.374000 audit[2453]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.374000 audit[2453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe663dfa0 a2=0 a3=1 items=0 ppid=2311 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:46:53.378000 audit[2454]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.378000 audit[2454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffccc1db50 a2=0 a3=1 items=0 ppid=2311 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:46:53.383000 audit[2456]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.383000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe081f900 a2=0 a3=1 items=0 ppid=2311 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:46:53.385000 audit[2457]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.385000 audit[2457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3086350 a2=0 a3=1 items=0 ppid=2311 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:46:53.391000 audit[2459]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.391000 audit[2459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd1dcc090 a2=0 a3=1 items=0 ppid=2311 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:46:53.398000 audit[2462]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.398000 audit[2462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd1dfc740 a2=0 a3=1 items=0 ppid=2311 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:46:53.405000 audit[2465]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.405000 audit[2465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd551ded0 a2=0 a3=1 items=0 ppid=2311 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 00:46:53.408000 audit[2466]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.408000 audit[2466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff86d5640 a2=0 a3=1 items=0 ppid=2311 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:46:53.412000 audit[2468]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.412000 audit[2468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd7f0c6e0 a2=0 a3=1 items=0 ppid=2311 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:46:53.419000 audit[2471]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.419000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcf2bba30 a2=0 a3=1 items=0 ppid=2311 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:46:53.425000 audit[2472]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.425000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee0efd20 a2=0 a3=1 items=0 ppid=2311 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:46:53.430000 audit[2474]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.430000 audit[2474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe96f68b0 a2=0 a3=1 items=0 ppid=2311 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:46:53.434000 audit[2475]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.434000 audit[2475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd52adb0 a2=0 a3=1 items=0 ppid=2311 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:46:53.440000 audit[2477]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.440000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff8660cf0 a2=0 a3=1 items=0 ppid=2311 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:46:53.449000 audit[2480]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:46:53.449000 audit[2480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc8df2470 a2=0 a3=1 items=0 ppid=2311 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:46:53.455000 audit[2482]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:46:53.455000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffe5228cd0 a2=0 a3=1 items=0 ppid=2311 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.455000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:53.456000 audit[2482]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:46:53.456000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe5228cd0 a2=0 a3=1 items=0 ppid=2311 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:53.456000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:53.835351 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3930544390.mount: Deactivated successfully. Jul 2 00:46:53.915603 kubelet[2141]: E0702 00:46:53.915534 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:54.036896 env[1741]: time="2024-07-02T00:46:54.036797241Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:54.040202 env[1741]: time="2024-07-02T00:46:54.040137775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:54.043308 env[1741]: time="2024-07-02T00:46:54.043252819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:54.046040 env[1741]: time="2024-07-02T00:46:54.045993060Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:54.046999 env[1741]: time="2024-07-02T00:46:54.046936738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 00:46:54.051830 env[1741]: time="2024-07-02T00:46:54.051754485Z" level=info msg="CreateContainer within sandbox \"2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 00:46:54.080808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1498377141.mount: Deactivated successfully. Jul 2 00:46:54.092259 env[1741]: time="2024-07-02T00:46:54.091284276Z" level=info msg="CreateContainer within sandbox \"2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541\"" Jul 2 00:46:54.092949 env[1741]: time="2024-07-02T00:46:54.092889113Z" level=info msg="StartContainer for \"01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541\"" Jul 2 00:46:54.129742 systemd[1]: Started cri-containerd-01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541.scope. Jul 2 00:46:54.136660 kubelet[2141]: E0702 00:46:54.135706 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:46:54.173000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.173000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2229 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:54.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633633613465373661623761353635313866653264626261366564 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.174000 audit: BPF prog-id=75 op=LOAD Jul 2 00:46:54.174000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2229 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:54.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633633613465373661623761353635313866653264626261366564 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.175000 audit: BPF prog-id=76 op=LOAD Jul 2 00:46:54.175000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2229 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:54.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633633613465373661623761353635313866653264626261366564 Jul 2 00:46:54.177000 audit: BPF prog-id=76 op=UNLOAD Jul 2 00:46:54.177000 audit: BPF prog-id=75 op=UNLOAD Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:54.177000 audit: BPF prog-id=77 op=LOAD Jul 2 00:46:54.177000 audit[2492]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2229 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:54.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633633613465373661623761353635313866653264626261366564 Jul 2 00:46:54.208245 env[1741]: time="2024-07-02T00:46:54.208179473Z" level=info msg="StartContainer for \"01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541\" returns successfully" Jul 2 00:46:54.213673 kubelet[2141]: E0702 00:46:54.212900 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.214131 kubelet[2141]: W0702 00:46:54.213983 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.214131 kubelet[2141]: E0702 00:46:54.214028 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.214772 kubelet[2141]: E0702 00:46:54.214741 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.215102 kubelet[2141]: W0702 00:46:54.215061 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.215289 kubelet[2141]: E0702 00:46:54.215264 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.215966 kubelet[2141]: E0702 00:46:54.215916 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.216207 kubelet[2141]: W0702 00:46:54.216176 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.216363 kubelet[2141]: E0702 00:46:54.216340 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.216939 kubelet[2141]: E0702 00:46:54.216909 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.217158 kubelet[2141]: W0702 00:46:54.217112 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.217625 kubelet[2141]: E0702 00:46:54.217547 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.218255 kubelet[2141]: E0702 00:46:54.218223 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.218466 kubelet[2141]: W0702 00:46:54.218439 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.218719 kubelet[2141]: E0702 00:46:54.218694 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.219270 kubelet[2141]: E0702 00:46:54.219241 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.219462 kubelet[2141]: W0702 00:46:54.219422 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.219673 kubelet[2141]: E0702 00:46:54.219649 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.220184 kubelet[2141]: E0702 00:46:54.220156 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.220384 kubelet[2141]: W0702 00:46:54.220358 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.220558 kubelet[2141]: E0702 00:46:54.220534 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.221160 kubelet[2141]: E0702 00:46:54.221133 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.221330 kubelet[2141]: W0702 00:46:54.221303 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.221504 kubelet[2141]: E0702 00:46:54.221476 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.222168 kubelet[2141]: E0702 00:46:54.222138 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.222386 kubelet[2141]: W0702 00:46:54.222357 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.222524 kubelet[2141]: E0702 00:46:54.222498 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.223491 kubelet[2141]: E0702 00:46:54.223449 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.223797 kubelet[2141]: W0702 00:46:54.223760 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.223956 kubelet[2141]: E0702 00:46:54.223923 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.224552 kubelet[2141]: E0702 00:46:54.224521 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.224828 kubelet[2141]: W0702 00:46:54.224787 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.224975 kubelet[2141]: E0702 00:46:54.224948 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.225499 kubelet[2141]: E0702 00:46:54.225472 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.225719 kubelet[2141]: W0702 00:46:54.225691 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.225861 kubelet[2141]: E0702 00:46:54.225835 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.226471 kubelet[2141]: E0702 00:46:54.226447 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.226658 kubelet[2141]: W0702 00:46:54.226632 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.226789 kubelet[2141]: E0702 00:46:54.226763 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.227240 kubelet[2141]: E0702 00:46:54.227214 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.227446 kubelet[2141]: W0702 00:46:54.227416 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.227655 kubelet[2141]: E0702 00:46:54.227550 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.228117 kubelet[2141]: E0702 00:46:54.228092 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.228261 kubelet[2141]: W0702 00:46:54.228236 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.228384 kubelet[2141]: E0702 00:46:54.228354 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.228904 kubelet[2141]: E0702 00:46:54.228871 2141 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:46:54.229101 kubelet[2141]: W0702 00:46:54.229074 2141 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:46:54.229240 kubelet[2141]: E0702 00:46:54.229202 2141 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:46:54.231426 systemd[1]: cri-containerd-01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541.scope: Deactivated successfully. Jul 2 00:46:54.233000 audit: BPF prog-id=77 op=UNLOAD Jul 2 00:46:54.722426 env[1741]: time="2024-07-02T00:46:54.722366330Z" level=info msg="shim disconnected" id=01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541 Jul 2 00:46:54.722880 env[1741]: time="2024-07-02T00:46:54.722841368Z" level=warning msg="cleaning up after shim disconnected" id=01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541 namespace=k8s.io Jul 2 00:46:54.723030 env[1741]: time="2024-07-02T00:46:54.723001601Z" level=info msg="cleaning up dead shim" Jul 2 00:46:54.736660 env[1741]: time="2024-07-02T00:46:54.736601464Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:46:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2560 runtime=io.containerd.runc.v2\n" Jul 2 00:46:54.833119 systemd[1]: run-containerd-runc-k8s.io-01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541-runc.akBsHZ.mount: Deactivated successfully. Jul 2 00:46:54.833297 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-01c63a4e76ab7a56518fe2dbba6ed4399805a1a572cb50cc263f6f9ba9e65541-rootfs.mount: Deactivated successfully. Jul 2 00:46:54.916174 kubelet[2141]: E0702 00:46:54.916124 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:55.170079 env[1741]: time="2024-07-02T00:46:55.169926760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 00:46:55.916587 kubelet[2141]: E0702 00:46:55.916499 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:56.135305 kubelet[2141]: E0702 00:46:56.135211 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:46:56.321000 audit[2574]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.324146 kernel: kauditd_printk_skb: 410 callbacks suppressed Jul 2 00:46:56.324300 kernel: audit: type=1325 audit(1719881216.321:543): table=filter:65 family=2 entries=14 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.321000 audit[2574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffea4d36d0 a2=0 a3=1 items=0 ppid=2311 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:56.339340 kernel: audit: type=1300 audit(1719881216.321:543): arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffea4d36d0 a2=0 a3=1 items=0 ppid=2311 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:56.321000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:56.346431 kernel: audit: type=1327 audit(1719881216.321:543): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:56.346624 kernel: audit: type=1325 audit(1719881216.340:544): table=nat:66 family=2 entries=14 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.340000 audit[2574]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.340000 audit[2574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffea4d36d0 a2=0 a3=1 items=0 ppid=2311 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:56.368497 kernel: audit: type=1300 audit(1719881216.340:544): arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffea4d36d0 a2=0 a3=1 items=0 ppid=2311 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:56.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:56.373839 kernel: audit: type=1327 audit(1719881216.340:544): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:56.376000 audit[2576]: NETFILTER_CFG table=filter:67 family=2 entries=11 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.385301 kernel: audit: type=1325 audit(1719881216.376:545): table=filter:67 family=2 entries=11 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.385480 kernel: audit: type=1300 audit(1719881216.376:545): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffe8156e0 a2=0 a3=1 items=0 ppid=2311 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:56.376000 audit[2576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffe8156e0 a2=0 a3=1 items=0 ppid=2311 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:56.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:56.379000 audit[2576]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.405107 kernel: audit: type=1327 audit(1719881216.376:545): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:56.405243 kernel: audit: type=1325 audit(1719881216.379:546): table=nat:68 family=2 entries=35 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:56.379000 audit[2576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffffe8156e0 a2=0 a3=1 items=0 ppid=2311 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:56.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:56.917272 kubelet[2141]: E0702 00:46:56.917107 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:57.917590 kubelet[2141]: E0702 00:46:57.917471 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:58.136068 kubelet[2141]: E0702 00:46:58.135994 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:46:58.389000 audit[2581]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:58.389000 audit[2581]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffddcb4f90 a2=0 a3=1 items=0 ppid=2311 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:58.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:58.392000 audit[2581]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:58.392000 audit[2581]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffddcb4f90 a2=0 a3=1 items=0 ppid=2311 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:58.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:58.413000 audit[2583]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:58.413000 audit[2583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffed9091f0 a2=0 a3=1 items=0 ppid=2311 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:58.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:58.422000 audit[2583]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:46:58.422000 audit[2583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffed9091f0 a2=0 a3=1 items=0 ppid=2311 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:58.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:46:58.918451 kubelet[2141]: E0702 00:46:58.918369 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:59.756254 env[1741]: time="2024-07-02T00:46:59.756190455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:59.759948 env[1741]: time="2024-07-02T00:46:59.759892454Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:59.763756 env[1741]: time="2024-07-02T00:46:59.763691742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:59.766070 env[1741]: time="2024-07-02T00:46:59.766022456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:46:59.767254 env[1741]: time="2024-07-02T00:46:59.767185230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 00:46:59.772139 env[1741]: time="2024-07-02T00:46:59.772060466Z" level=info msg="CreateContainer within sandbox \"2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 00:46:59.799465 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount550205721.mount: Deactivated successfully. Jul 2 00:46:59.809798 env[1741]: time="2024-07-02T00:46:59.809710219Z" level=info msg="CreateContainer within sandbox \"2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be\"" Jul 2 00:46:59.810749 env[1741]: time="2024-07-02T00:46:59.810592420Z" level=info msg="StartContainer for \"a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be\"" Jul 2 00:46:59.861058 systemd[1]: run-containerd-runc-k8s.io-a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be-runc.jlkUAO.mount: Deactivated successfully. Jul 2 00:46:59.865213 systemd[1]: Started cri-containerd-a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be.scope. Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2229 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:59.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396663336362346333666134636538303731306438316633643930 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.900000 audit: BPF prog-id=78 op=LOAD Jul 2 00:46:59.900000 audit[2593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2229 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:59.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396663336362346333666134636538303731306438316633643930 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.902000 audit: BPF prog-id=79 op=LOAD Jul 2 00:46:59.902000 audit[2593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2229 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:59.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396663336362346333666134636538303731306438316633643930 Jul 2 00:46:59.903000 audit: BPF prog-id=79 op=UNLOAD Jul 2 00:46:59.903000 audit: BPF prog-id=78 op=UNLOAD Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:46:59.903000 audit: BPF prog-id=80 op=LOAD Jul 2 00:46:59.903000 audit[2593]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2229 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:46:59.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396663336362346333666134636538303731306438316633643930 Jul 2 00:46:59.920081 kubelet[2141]: E0702 00:46:59.920007 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:46:59.933293 env[1741]: time="2024-07-02T00:46:59.933161755Z" level=info msg="StartContainer for \"a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be\" returns successfully" Jul 2 00:47:00.135255 kubelet[2141]: E0702 00:47:00.135196 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:47:00.920646 kubelet[2141]: E0702 00:47:00.920603 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:01.078028 systemd[1]: cri-containerd-a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be.scope: Deactivated successfully. Jul 2 00:47:01.080000 audit: BPF prog-id=80 op=UNLOAD Jul 2 00:47:01.115695 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be-rootfs.mount: Deactivated successfully. Jul 2 00:47:01.168840 kubelet[2141]: I0702 00:47:01.168415 2141 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 00:47:01.922251 kubelet[2141]: E0702 00:47:01.922201 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:01.923142 env[1741]: time="2024-07-02T00:47:01.923075092Z" level=info msg="shim disconnected" id=a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be Jul 2 00:47:01.923699 env[1741]: time="2024-07-02T00:47:01.923147797Z" level=warning msg="cleaning up after shim disconnected" id=a99fc3cb4c3fa4ce80710d81f3d9039d1411349302e330442dd0ce43c70f35be namespace=k8s.io Jul 2 00:47:01.923699 env[1741]: time="2024-07-02T00:47:01.923171120Z" level=info msg="cleaning up dead shim" Jul 2 00:47:01.938471 env[1741]: time="2024-07-02T00:47:01.938384882Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:47:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2630 runtime=io.containerd.runc.v2\n" Jul 2 00:47:02.144393 systemd[1]: Created slice kubepods-besteffort-pod34f91864_803a_4e5e_82f4_cff9840978a8.slice. Jul 2 00:47:02.150330 env[1741]: time="2024-07-02T00:47:02.150274678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-79tnn,Uid:34f91864-803a-4e5e-82f4-cff9840978a8,Namespace:calico-system,Attempt:0,}" Jul 2 00:47:02.212649 env[1741]: time="2024-07-02T00:47:02.211919431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 00:47:02.293219 env[1741]: time="2024-07-02T00:47:02.293124086Z" level=error msg="Failed to destroy network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:02.296045 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6-shm.mount: Deactivated successfully. Jul 2 00:47:02.298221 env[1741]: time="2024-07-02T00:47:02.297732125Z" level=error msg="encountered an error cleaning up failed sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:02.298221 env[1741]: time="2024-07-02T00:47:02.297829500Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-79tnn,Uid:34f91864-803a-4e5e-82f4-cff9840978a8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:02.299525 kubelet[2141]: E0702 00:47:02.298795 2141 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:02.299525 kubelet[2141]: E0702 00:47:02.298906 2141 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-79tnn" Jul 2 00:47:02.299525 kubelet[2141]: E0702 00:47:02.298942 2141 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-79tnn" Jul 2 00:47:02.299956 kubelet[2141]: E0702 00:47:02.299007 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-79tnn_calico-system(34f91864-803a-4e5e-82f4-cff9840978a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-79tnn_calico-system(34f91864-803a-4e5e-82f4-cff9840978a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:47:02.857460 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 00:47:02.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:02.859999 kernel: kauditd_printk_skb: 58 callbacks suppressed Jul 2 00:47:02.860081 kernel: audit: type=1131 audit(1719881222.857:558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:47:02.887000 audit: BPF prog-id=51 op=UNLOAD Jul 2 00:47:02.887000 audit: BPF prog-id=50 op=UNLOAD Jul 2 00:47:02.892478 kernel: audit: type=1334 audit(1719881222.887:559): prog-id=51 op=UNLOAD Jul 2 00:47:02.892560 kernel: audit: type=1334 audit(1719881222.887:560): prog-id=50 op=UNLOAD Jul 2 00:47:02.887000 audit: BPF prog-id=49 op=UNLOAD Jul 2 00:47:02.895534 kernel: audit: type=1334 audit(1719881222.887:561): prog-id=49 op=UNLOAD Jul 2 00:47:02.923440 kubelet[2141]: E0702 00:47:02.923317 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:03.216254 kubelet[2141]: I0702 00:47:03.216113 2141 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:03.218704 env[1741]: time="2024-07-02T00:47:03.218641165Z" level=info msg="StopPodSandbox for \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\"" Jul 2 00:47:03.296456 env[1741]: time="2024-07-02T00:47:03.296354363Z" level=error msg="StopPodSandbox for \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\" failed" error="failed to destroy network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:03.296756 kubelet[2141]: E0702 00:47:03.296696 2141 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:03.296873 kubelet[2141]: E0702 00:47:03.296782 2141 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6"} Jul 2 00:47:03.296941 kubelet[2141]: E0702 00:47:03.296867 2141 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"34f91864-803a-4e5e-82f4-cff9840978a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:47:03.296941 kubelet[2141]: E0702 00:47:03.296911 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"34f91864-803a-4e5e-82f4-cff9840978a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-79tnn" podUID="34f91864-803a-4e5e-82f4-cff9840978a8" Jul 2 00:47:03.924056 kubelet[2141]: E0702 00:47:03.923981 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:04.924908 kubelet[2141]: E0702 00:47:04.924840 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:05.039851 kubelet[2141]: I0702 00:47:05.039075 2141 topology_manager.go:215] "Topology Admit Handler" podUID="e47755dc-6f4c-4829-80cc-fcd3bbef85a9" podNamespace="default" podName="nginx-deployment-85f456d6dd-6n2pl" Jul 2 00:47:05.045250 kubelet[2141]: W0702 00:47:05.045151 2141 reflector.go:547] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.22.71" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '172.31.22.71' and this object Jul 2 00:47:05.045495 kubelet[2141]: E0702 00:47:05.045471 2141 reflector.go:150] object-"default"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.22.71" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '172.31.22.71' and this object Jul 2 00:47:05.049430 systemd[1]: Created slice kubepods-besteffort-pode47755dc_6f4c_4829_80cc_fcd3bbef85a9.slice. Jul 2 00:47:05.215964 kubelet[2141]: I0702 00:47:05.215827 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxfnx\" (UniqueName: \"kubernetes.io/projected/e47755dc-6f4c-4829-80cc-fcd3bbef85a9-kube-api-access-xxfnx\") pod \"nginx-deployment-85f456d6dd-6n2pl\" (UID: \"e47755dc-6f4c-4829-80cc-fcd3bbef85a9\") " pod="default/nginx-deployment-85f456d6dd-6n2pl" Jul 2 00:47:05.925322 kubelet[2141]: E0702 00:47:05.925276 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:06.327611 kubelet[2141]: E0702 00:47:06.327541 2141 projected.go:294] Couldn't get configMap default/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Jul 2 00:47:06.327611 kubelet[2141]: E0702 00:47:06.327611 2141 projected.go:200] Error preparing data for projected volume kube-api-access-xxfnx for pod default/nginx-deployment-85f456d6dd-6n2pl: failed to sync configmap cache: timed out waiting for the condition Jul 2 00:47:06.327872 kubelet[2141]: E0702 00:47:06.327722 2141 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/e47755dc-6f4c-4829-80cc-fcd3bbef85a9-kube-api-access-xxfnx podName:e47755dc-6f4c-4829-80cc-fcd3bbef85a9 nodeName:}" failed. No retries permitted until 2024-07-02 00:47:06.827689218 +0000 UTC m=+21.199620128 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-xxfnx" (UniqueName: "kubernetes.io/projected/e47755dc-6f4c-4829-80cc-fcd3bbef85a9-kube-api-access-xxfnx") pod "nginx-deployment-85f456d6dd-6n2pl" (UID: "e47755dc-6f4c-4829-80cc-fcd3bbef85a9") : failed to sync configmap cache: timed out waiting for the condition Jul 2 00:47:06.910596 kubelet[2141]: E0702 00:47:06.910522 2141 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:06.926100 kubelet[2141]: E0702 00:47:06.926047 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:07.157461 env[1741]: time="2024-07-02T00:47:07.157370735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-6n2pl,Uid:e47755dc-6f4c-4829-80cc-fcd3bbef85a9,Namespace:default,Attempt:0,}" Jul 2 00:47:07.346301 env[1741]: time="2024-07-02T00:47:07.346203968Z" level=error msg="Failed to destroy network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:07.349556 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97-shm.mount: Deactivated successfully. Jul 2 00:47:07.351547 env[1741]: time="2024-07-02T00:47:07.351445403Z" level=error msg="encountered an error cleaning up failed sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:07.351804 env[1741]: time="2024-07-02T00:47:07.351634352Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-6n2pl,Uid:e47755dc-6f4c-4829-80cc-fcd3bbef85a9,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:07.352027 kubelet[2141]: E0702 00:47:07.351947 2141 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:07.352147 kubelet[2141]: E0702 00:47:07.352030 2141 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-6n2pl" Jul 2 00:47:07.352147 kubelet[2141]: E0702 00:47:07.352067 2141 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-6n2pl" Jul 2 00:47:07.352302 kubelet[2141]: E0702 00:47:07.352142 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-6n2pl_default(e47755dc-6f4c-4829-80cc-fcd3bbef85a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-6n2pl_default(e47755dc-6f4c-4829-80cc-fcd3bbef85a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-6n2pl" podUID="e47755dc-6f4c-4829-80cc-fcd3bbef85a9" Jul 2 00:47:07.926803 kubelet[2141]: E0702 00:47:07.926738 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:08.233204 kubelet[2141]: I0702 00:47:08.232340 2141 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:08.233960 env[1741]: time="2024-07-02T00:47:08.233890525Z" level=info msg="StopPodSandbox for \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\"" Jul 2 00:47:08.315971 env[1741]: time="2024-07-02T00:47:08.315874900Z" level=error msg="StopPodSandbox for \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\" failed" error="failed to destroy network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:47:08.316493 kubelet[2141]: E0702 00:47:08.316441 2141 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:08.316660 kubelet[2141]: E0702 00:47:08.316510 2141 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97"} Jul 2 00:47:08.316660 kubelet[2141]: E0702 00:47:08.316590 2141 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e47755dc-6f4c-4829-80cc-fcd3bbef85a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:47:08.316660 kubelet[2141]: E0702 00:47:08.316643 2141 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e47755dc-6f4c-4829-80cc-fcd3bbef85a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-6n2pl" podUID="e47755dc-6f4c-4829-80cc-fcd3bbef85a9" Jul 2 00:47:08.927643 kubelet[2141]: E0702 00:47:08.927588 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:09.642202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1760709461.mount: Deactivated successfully. Jul 2 00:47:09.712664 env[1741]: time="2024-07-02T00:47:09.712545599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:09.716197 env[1741]: time="2024-07-02T00:47:09.716115812Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:09.719978 env[1741]: time="2024-07-02T00:47:09.719900271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:09.723120 env[1741]: time="2024-07-02T00:47:09.723055558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:09.724258 env[1741]: time="2024-07-02T00:47:09.724196549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 00:47:09.756265 env[1741]: time="2024-07-02T00:47:09.756181465Z" level=info msg="CreateContainer within sandbox \"2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 00:47:09.784559 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount538060642.mount: Deactivated successfully. Jul 2 00:47:09.794674 env[1741]: time="2024-07-02T00:47:09.794556810Z" level=info msg="CreateContainer within sandbox \"2ace5a4ba6e5e4cc21f7d4918ccebdf735a1362657dbc9f7b17b746bdc60d694\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017\"" Jul 2 00:47:09.796084 env[1741]: time="2024-07-02T00:47:09.795983320Z" level=info msg="StartContainer for \"f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017\"" Jul 2 00:47:09.828293 systemd[1]: Started cri-containerd-f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017.scope. Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2229 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:09.890771 kernel: audit: type=1400 audit(1719881229.872:562): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890865 kernel: audit: type=1300 audit(1719881229.872:562): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2229 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:09.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333237666233323765613230393464356263376238316362666264 Jul 2 00:47:09.899887 kernel: audit: type=1327 audit(1719881229.872:562): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333237666233323765613230393464356263376238316362666264 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.906773 kernel: audit: type=1400 audit(1719881229.872:563): avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.907659 kernel: audit: type=1400 audit(1719881229.872:563): avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.921838 kernel: audit: type=1400 audit(1719881229.872:563): avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.928961 kernel: audit: type=1400 audit(1719881229.872:563): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.931185 kubelet[2141]: E0702 00:47:09.931146 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:09.938246 kernel: audit: type=1400 audit(1719881229.872:563): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.951426 kernel: audit: type=1400 audit(1719881229.872:563): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.951531 kernel: audit: type=1400 audit(1719881229.872:563): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.872000 audit: BPF prog-id=81 op=LOAD Jul 2 00:47:09.872000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2229 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:09.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333237666233323765613230393464356263376238316362666264 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.880000 audit: BPF prog-id=82 op=LOAD Jul 2 00:47:09.880000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2229 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:09.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333237666233323765613230393464356263376238316362666264 Jul 2 00:47:09.890000 audit: BPF prog-id=82 op=UNLOAD Jul 2 00:47:09.890000 audit: BPF prog-id=81 op=UNLOAD Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:09.890000 audit: BPF prog-id=83 op=LOAD Jul 2 00:47:09.890000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2229 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:09.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333237666233323765613230393464356263376238316362666264 Jul 2 00:47:09.963267 env[1741]: time="2024-07-02T00:47:09.963200830Z" level=info msg="StartContainer for \"f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017\" returns successfully" Jul 2 00:47:10.085602 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 00:47:10.085772 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 00:47:10.932231 kubelet[2141]: E0702 00:47:10.932166 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:11.278934 systemd[1]: run-containerd-runc-k8s.io-f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017-runc.xD84Sw.mount: Deactivated successfully. Jul 2 00:47:11.543000 audit[2907]: AVC avc: denied { write } for pid=2907 comm="tee" name="fd" dev="proc" ino=15196 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:47:11.543000 audit[2907]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7022a23 a2=241 a3=1b6 items=1 ppid=2868 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:11.543000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 00:47:11.543000 audit: PATH item=0 name="/dev/fd/63" inode=15883 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:47:11.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:47:11.561000 audit[2918]: AVC avc: denied { write } for pid=2918 comm="tee" name="fd" dev="proc" ino=15898 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:47:11.561000 audit[2918]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeeaada21 a2=241 a3=1b6 items=1 ppid=2877 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:11.561000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 00:47:11.561000 audit: PATH item=0 name="/dev/fd/63" inode=15894 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:47:11.561000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:47:11.572000 audit[2927]: AVC avc: denied { write } for pid=2927 comm="tee" name="fd" dev="proc" ino=15905 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:47:11.574000 audit[2920]: AVC avc: denied { write } for pid=2920 comm="tee" name="fd" dev="proc" ino=15906 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:47:11.574000 audit[2920]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeb748a21 a2=241 a3=1b6 items=1 ppid=2875 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:11.574000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 00:47:11.574000 audit: PATH item=0 name="/dev/fd/63" inode=15200 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:47:11.574000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:47:11.582000 audit[2932]: AVC avc: denied { write } for pid=2932 comm="tee" name="fd" dev="proc" ino=15215 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:47:11.582000 audit[2932]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffd42ea12 a2=241 a3=1b6 items=1 ppid=2883 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:11.582000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 00:47:11.572000 audit[2927]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdea86a22 a2=241 a3=1b6 items=1 ppid=2873 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:11.582000 audit: PATH item=0 name="/dev/fd/63" inode=15206 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:47:11.582000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:47:11.572000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 00:47:11.572000 audit: PATH item=0 name="/dev/fd/63" inode=15205 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:47:11.572000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:47:11.584000 audit[2930]: AVC avc: denied { write } for pid=2930 comm="tee" name="fd" dev="proc" ino=15217 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:47:11.584000 audit[2930]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8a1da11 a2=241 a3=1b6 items=1 ppid=2871 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:11.584000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 00:47:11.584000 audit: PATH item=0 name="/dev/fd/63" inode=15897 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:47:11.584000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:47:11.591000 audit[2937]: AVC avc: denied { write } for pid=2937 comm="tee" name="fd" dev="proc" ino=15911 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:47:11.591000 audit[2937]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc2bc3a21 a2=241 a3=1b6 items=1 ppid=2879 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:11.591000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 00:47:11.591000 audit: PATH item=0 name="/dev/fd/63" inode=15899 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:47:11.591000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:47:11.933145 kubelet[2141]: E0702 00:47:11.933064 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:11.954179 kernel: Initializing XFRM netlink socket Jul 2 00:47:12.139112 (udev-worker)[2795]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:47:12.141497 systemd-networkd[1462]: vxlan.calico: Link UP Jul 2 00:47:12.141519 systemd-networkd[1462]: vxlan.calico: Gained carrier Jul 2 00:47:12.196646 (udev-worker)[3000]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit: BPF prog-id=84 op=LOAD Jul 2 00:47:12.205000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffca1a2c68 a2=70 a3=ffffca1a2cd8 items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.205000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.205000 audit: BPF prog-id=84 op=UNLOAD Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit: BPF prog-id=85 op=LOAD Jul 2 00:47:12.205000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffca1a2c68 a2=70 a3=4b243c items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.205000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.205000 audit: BPF prog-id=85 op=UNLOAD Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffca1a2c20 a2=70 a3=ffffca1a2c90 items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.205000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit: BPF prog-id=86 op=LOAD Jul 2 00:47:12.205000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffca1a2c08 a2=70 a3=ffffca1a2c78 items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.205000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.205000 audit: BPF prog-id=86 op=UNLOAD Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca1a2cd8 a2=70 a3=0 items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.205000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca1a2cc8 a2=70 a3=0 items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.205000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.205000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.205000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffca1a2c38 a2=70 a3=0 items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.205000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffca1a2d10 a2=70 a3=1d33342f items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.206000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffca1a2d10 a2=70 a3=1d33342f items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.206000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.206000 audit: BPF prog-id=87 op=LOAD Jul 2 00:47:12.206000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffca1a2c38 a2=70 a3=1d333449 items=0 ppid=2882 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.206000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:47:12.217000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.217000 audit[3013]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd51fd0f8 a2=70 a3=ffffd51fd168 items=0 ppid=2882 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.217000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:47:12.218000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:12.218000 audit[3013]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd51fcfc8 a2=70 a3=ffffd51fd038 items=0 ppid=2882 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:47:12.228000 audit: BPF prog-id=87 op=UNLOAD Jul 2 00:47:12.228000 audit[3016]: SYSCALL arch=c00000b7 syscall=57 success=yes exit=0 a0=7 a1=1 a2=0 a3=0 items=0 ppid=1456 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.228000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 00:47:12.346000 audit[3036]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:12.346000 audit[3036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffc6b5e10 a2=0 a3=ffffa342bfa8 items=0 ppid=2882 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.346000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:12.354000 audit[3037]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:12.354000 audit[3037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd91864b0 a2=0 a3=ffffbd753fa8 items=0 ppid=2882 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:12.360000 audit[3040]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:12.360000 audit[3040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffca1bda30 a2=0 a3=ffffa10edfa8 items=0 ppid=2882 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.360000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:12.365000 audit[3038]: NETFILTER_CFG table=raw:76 family=2 entries=19 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:12.365000 audit[3038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffcf6ae980 a2=0 a3=ffff8c2cefa8 items=0 ppid=2882 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:12.365000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:12.933787 kubelet[2141]: E0702 00:47:12.933724 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:13.934418 kubelet[2141]: E0702 00:47:13.934352 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:14.004780 systemd-networkd[1462]: vxlan.calico: Gained IPv6LL Jul 2 00:47:14.935163 kubelet[2141]: E0702 00:47:14.935082 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:15.137598 env[1741]: time="2024-07-02T00:47:15.137496953Z" level=info msg="StopPodSandbox for \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\"" Jul 2 00:47:15.224930 kubelet[2141]: I0702 00:47:15.223947 2141 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-45sx2" podStartSLOduration=8.62561415 podStartE2EDuration="28.223923148s" podCreationTimestamp="2024-07-02 00:46:47 +0000 UTC" firstStartedPulling="2024-07-02 00:46:50.127766832 +0000 UTC m=+4.499697742" lastFinishedPulling="2024-07-02 00:47:09.72607583 +0000 UTC m=+24.098006740" observedRunningTime="2024-07-02 00:47:10.27062381 +0000 UTC m=+24.642554720" watchObservedRunningTime="2024-07-02 00:47:15.223923148 +0000 UTC m=+29.595854070" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.223 [INFO][3065] k8s.go 608: Cleaning up netns ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.225 [INFO][3065] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" iface="eth0" netns="/var/run/netns/cni-37f5c599-d946-0e20-825e-71fd0c5781a8" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.225 [INFO][3065] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" iface="eth0" netns="/var/run/netns/cni-37f5c599-d946-0e20-825e-71fd0c5781a8" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.226 [INFO][3065] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" iface="eth0" netns="/var/run/netns/cni-37f5c599-d946-0e20-825e-71fd0c5781a8" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.226 [INFO][3065] k8s.go 615: Releasing IP address(es) ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.226 [INFO][3065] utils.go 188: Calico CNI releasing IP address ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.277 [INFO][3071] ipam_plugin.go 411: Releasing address using handleID ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.281 [INFO][3071] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.283 [INFO][3071] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.295 [WARNING][3071] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.295 [INFO][3071] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.297 [INFO][3071] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:15.303067 env[1741]: 2024-07-02 00:47:15.300 [INFO][3065] k8s.go 621: Teardown processing complete. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:15.306528 systemd[1]: run-netns-cni\x2d37f5c599\x2dd946\x2d0e20\x2d825e\x2d71fd0c5781a8.mount: Deactivated successfully. Jul 2 00:47:15.309726 env[1741]: time="2024-07-02T00:47:15.308448284Z" level=info msg="TearDown network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\" successfully" Jul 2 00:47:15.309726 env[1741]: time="2024-07-02T00:47:15.308504958Z" level=info msg="StopPodSandbox for \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\" returns successfully" Jul 2 00:47:15.310258 env[1741]: time="2024-07-02T00:47:15.310200520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-79tnn,Uid:34f91864-803a-4e5e-82f4-cff9840978a8,Namespace:calico-system,Attempt:1,}" Jul 2 00:47:15.608141 systemd-networkd[1462]: cali6f7c40fadf8: Link UP Jul 2 00:47:15.613693 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:47:15.614137 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6f7c40fadf8: link becomes ready Jul 2 00:47:15.614023 systemd-networkd[1462]: cali6f7c40fadf8: Gained carrier Jul 2 00:47:15.615270 (udev-worker)[3098]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.472 [INFO][3078] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.71-k8s-csi--node--driver--79tnn-eth0 csi-node-driver- calico-system 34f91864-803a-4e5e-82f4-cff9840978a8 1035 0 2024-07-02 00:46:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.71 csi-node-driver-79tnn eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali6f7c40fadf8 [] []}} ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.472 [INFO][3078] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.532 [INFO][3090] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" HandleID="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.549 [INFO][3090] ipam_plugin.go 264: Auto assigning IP ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" HandleID="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000306c10), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.22.71", "pod":"csi-node-driver-79tnn", "timestamp":"2024-07-02 00:47:15.532313003 +0000 UTC"}, Hostname:"172.31.22.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.549 [INFO][3090] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.549 [INFO][3090] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.549 [INFO][3090] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.71' Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.552 [INFO][3090] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.558 [INFO][3090] ipam.go 372: Looking up existing affinities for host host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.569 [INFO][3090] ipam.go 489: Trying affinity for 192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.572 [INFO][3090] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.576 [INFO][3090] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.577 [INFO][3090] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.579 [INFO][3090] ipam.go 1685: Creating new handle: k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225 Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.585 [INFO][3090] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.595 [INFO][3090] ipam.go 1216: Successfully claimed IPs: [192.168.125.65/26] block=192.168.125.64/26 handle="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.596 [INFO][3090] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.65/26] handle="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" host="172.31.22.71" Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.596 [INFO][3090] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:15.644548 env[1741]: 2024-07-02 00:47:15.596 [INFO][3090] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.125.65/26] IPv6=[] ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" HandleID="k8s-pod-network.5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.645883 env[1741]: 2024-07-02 00:47:15.602 [INFO][3078] k8s.go 386: Populated endpoint ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-csi--node--driver--79tnn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34f91864-803a-4e5e-82f4-cff9840978a8", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 46, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"", Pod:"csi-node-driver-79tnn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6f7c40fadf8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:15.645883 env[1741]: 2024-07-02 00:47:15.602 [INFO][3078] k8s.go 387: Calico CNI using IPs: [192.168.125.65/32] ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.645883 env[1741]: 2024-07-02 00:47:15.602 [INFO][3078] dataplane_linux.go 68: Setting the host side veth name to cali6f7c40fadf8 ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.645883 env[1741]: 2024-07-02 00:47:15.614 [INFO][3078] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.645883 env[1741]: 2024-07-02 00:47:15.616 [INFO][3078] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-csi--node--driver--79tnn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34f91864-803a-4e5e-82f4-cff9840978a8", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 46, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225", Pod:"csi-node-driver-79tnn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6f7c40fadf8", MAC:"ee:30:b3:bd:ba:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:15.645883 env[1741]: 2024-07-02 00:47:15.636 [INFO][3078] k8s.go 500: Wrote updated endpoint to datastore ContainerID="5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225" Namespace="calico-system" Pod="csi-node-driver-79tnn" WorkloadEndpoint="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:15.667834 kernel: kauditd_printk_skb: 159 callbacks suppressed Jul 2 00:47:15.668025 kernel: audit: type=1325 audit(1719881235.664:595): table=filter:77 family=2 entries=34 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:15.664000 audit[3112]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:15.664000 audit[3112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffce752560 a2=0 a3=ffff99215fa8 items=0 ppid=2882 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:15.681867 kernel: audit: type=1300 audit(1719881235.664:595): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffce752560 a2=0 a3=ffff99215fa8 items=0 ppid=2882 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:15.682000 kernel: audit: type=1327 audit(1719881235.664:595): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:15.664000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:15.712156 env[1741]: time="2024-07-02T00:47:15.712057053Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:47:15.712440 env[1741]: time="2024-07-02T00:47:15.712378578Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:47:15.712656 env[1741]: time="2024-07-02T00:47:15.712604257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:47:15.713361 env[1741]: time="2024-07-02T00:47:15.713279661Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225 pid=3121 runtime=io.containerd.runc.v2 Jul 2 00:47:15.756518 systemd[1]: Started cri-containerd-5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225.scope. Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.807992 kernel: audit: type=1400 audit(1719881235.791:596): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.808835 kernel: audit: type=1400 audit(1719881235.791:597): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.808950 kernel: audit: type=1400 audit(1719881235.791:598): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.822079 kernel: audit: type=1400 audit(1719881235.791:599): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.829503 kernel: audit: type=1400 audit(1719881235.791:600): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.837060 kernel: audit: type=1400 audit(1719881235.791:601): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.845978 kernel: audit: type=1400 audit(1719881235.791:602): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.791000 audit: BPF prog-id=88 op=LOAD Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3121 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:15.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373032623734656430303164633364343033626561353262306337 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3121 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:15.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373032623734656430303164633364343033626561353262306337 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.792000 audit: BPF prog-id=89 op=LOAD Jul 2 00:47:15.792000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3121 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:15.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373032623734656430303164633364343033626561353262306337 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit: BPF prog-id=90 op=LOAD Jul 2 00:47:15.799000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3121 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:15.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373032623734656430303164633364343033626561353262306337 Jul 2 00:47:15.799000 audit: BPF prog-id=90 op=UNLOAD Jul 2 00:47:15.799000 audit: BPF prog-id=89 op=UNLOAD Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:15.799000 audit: BPF prog-id=91 op=LOAD Jul 2 00:47:15.799000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3121 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:15.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373032623734656430303164633364343033626561353262306337 Jul 2 00:47:15.856224 env[1741]: time="2024-07-02T00:47:15.856163802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-79tnn,Uid:34f91864-803a-4e5e-82f4-cff9840978a8,Namespace:calico-system,Attempt:1,} returns sandbox id \"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225\"" Jul 2 00:47:15.864410 env[1741]: time="2024-07-02T00:47:15.859532008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 00:47:15.935713 kubelet[2141]: E0702 00:47:15.935660 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:16.306429 systemd[1]: run-containerd-runc-k8s.io-5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225-runc.c1223y.mount: Deactivated successfully. Jul 2 00:47:16.935914 kubelet[2141]: E0702 00:47:16.935831 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:16.949188 systemd-networkd[1462]: cali6f7c40fadf8: Gained IPv6LL Jul 2 00:47:17.152906 env[1741]: time="2024-07-02T00:47:17.152842548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:17.157937 env[1741]: time="2024-07-02T00:47:17.157852664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:17.162693 env[1741]: time="2024-07-02T00:47:17.162613918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:17.167523 env[1741]: time="2024-07-02T00:47:17.167442132Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:17.168895 env[1741]: time="2024-07-02T00:47:17.168828599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 00:47:17.173260 env[1741]: time="2024-07-02T00:47:17.173192749Z" level=info msg="CreateContainer within sandbox \"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 00:47:17.199550 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3819866887.mount: Deactivated successfully. Jul 2 00:47:17.214715 env[1741]: time="2024-07-02T00:47:17.214628022Z" level=info msg="CreateContainer within sandbox \"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"410462c4986e18d796ccbabb0ee81044b509b7699343e28e0caaf6f90649d599\"" Jul 2 00:47:17.216043 env[1741]: time="2024-07-02T00:47:17.215928538Z" level=info msg="StartContainer for \"410462c4986e18d796ccbabb0ee81044b509b7699343e28e0caaf6f90649d599\"" Jul 2 00:47:17.260920 systemd[1]: Started cri-containerd-410462c4986e18d796ccbabb0ee81044b509b7699343e28e0caaf6f90649d599.scope. Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3121 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:17.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303436326334393836653138643739366363626162623065653831 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.311000 audit: BPF prog-id=92 op=LOAD Jul 2 00:47:17.311000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3121 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:17.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303436326334393836653138643739366363626162623065653831 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit: BPF prog-id=93 op=LOAD Jul 2 00:47:17.312000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3121 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:17.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303436326334393836653138643739366363626162623065653831 Jul 2 00:47:17.312000 audit: BPF prog-id=93 op=UNLOAD Jul 2 00:47:17.312000 audit: BPF prog-id=92 op=UNLOAD Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:17.312000 audit: BPF prog-id=94 op=LOAD Jul 2 00:47:17.312000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3121 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:17.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303436326334393836653138643739366363626162623065653831 Jul 2 00:47:17.345120 env[1741]: time="2024-07-02T00:47:17.345030604Z" level=info msg="StartContainer for \"410462c4986e18d796ccbabb0ee81044b509b7699343e28e0caaf6f90649d599\" returns successfully" Jul 2 00:47:17.348714 env[1741]: time="2024-07-02T00:47:17.348548098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 00:47:17.430723 update_engine[1733]: I0702 00:47:17.430644 1733 update_attempter.cc:509] Updating boot flags... Jul 2 00:47:17.936173 kubelet[2141]: E0702 00:47:17.936065 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:18.630375 amazon-ssm-agent[1765]: 2024-07-02 00:47:18 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Jul 2 00:47:18.741136 env[1741]: time="2024-07-02T00:47:18.741059905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:18.744387 env[1741]: time="2024-07-02T00:47:18.744324602Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:18.747116 env[1741]: time="2024-07-02T00:47:18.747067046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:18.749876 env[1741]: time="2024-07-02T00:47:18.749829225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:18.750797 env[1741]: time="2024-07-02T00:47:18.750736667Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 00:47:18.755546 env[1741]: time="2024-07-02T00:47:18.755486156Z" level=info msg="CreateContainer within sandbox \"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 00:47:18.778812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2346717153.mount: Deactivated successfully. Jul 2 00:47:18.788046 env[1741]: time="2024-07-02T00:47:18.787967717Z" level=info msg="CreateContainer within sandbox \"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e6fe91d857dab82660539d512ee55105068d6bc149811825351d0d604c62c750\"" Jul 2 00:47:18.789331 env[1741]: time="2024-07-02T00:47:18.789283984Z" level=info msg="StartContainer for \"e6fe91d857dab82660539d512ee55105068d6bc149811825351d0d604c62c750\"" Jul 2 00:47:18.830932 systemd[1]: Started cri-containerd-e6fe91d857dab82660539d512ee55105068d6bc149811825351d0d604c62c750.scope. Jul 2 00:47:18.843245 systemd[1]: run-containerd-runc-k8s.io-e6fe91d857dab82660539d512ee55105068d6bc149811825351d0d604c62c750-runc.PmRpzx.mount: Deactivated successfully. Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3121 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:18.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666539316438353764616238323636303533396435313265653535 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.878000 audit: BPF prog-id=95 op=LOAD Jul 2 00:47:18.878000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3121 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:18.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666539316438353764616238323636303533396435313265653535 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit: BPF prog-id=96 op=LOAD Jul 2 00:47:18.879000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3121 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:18.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666539316438353764616238323636303533396435313265653535 Jul 2 00:47:18.879000 audit: BPF prog-id=96 op=UNLOAD Jul 2 00:47:18.879000 audit: BPF prog-id=95 op=UNLOAD Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:18.879000 audit: BPF prog-id=97 op=LOAD Jul 2 00:47:18.879000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3121 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:18.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536666539316438353764616238323636303533396435313265653535 Jul 2 00:47:18.913884 env[1741]: time="2024-07-02T00:47:18.913814204Z" level=info msg="StartContainer for \"e6fe91d857dab82660539d512ee55105068d6bc149811825351d0d604c62c750\" returns successfully" Jul 2 00:47:18.936387 kubelet[2141]: E0702 00:47:18.936294 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:19.066349 kubelet[2141]: I0702 00:47:19.066308 2141 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 00:47:19.066349 kubelet[2141]: I0702 00:47:19.066356 2141 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 00:47:19.140003 env[1741]: time="2024-07-02T00:47:19.137819953Z" level=info msg="StopPodSandbox for \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\"" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.213 [INFO][3427] k8s.go 608: Cleaning up netns ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.213 [INFO][3427] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" iface="eth0" netns="/var/run/netns/cni-eb57189d-f053-c862-76b6-6cacf8d15ab0" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.214 [INFO][3427] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" iface="eth0" netns="/var/run/netns/cni-eb57189d-f053-c862-76b6-6cacf8d15ab0" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.214 [INFO][3427] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" iface="eth0" netns="/var/run/netns/cni-eb57189d-f053-c862-76b6-6cacf8d15ab0" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.214 [INFO][3427] k8s.go 615: Releasing IP address(es) ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.214 [INFO][3427] utils.go 188: Calico CNI releasing IP address ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.250 [INFO][3433] ipam_plugin.go 411: Releasing address using handleID ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.250 [INFO][3433] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.251 [INFO][3433] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.266 [WARNING][3433] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.266 [INFO][3433] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.269 [INFO][3433] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:19.273750 env[1741]: 2024-07-02 00:47:19.271 [INFO][3427] k8s.go 621: Teardown processing complete. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:19.274981 env[1741]: time="2024-07-02T00:47:19.274918415Z" level=info msg="TearDown network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\" successfully" Jul 2 00:47:19.275111 env[1741]: time="2024-07-02T00:47:19.274981052Z" level=info msg="StopPodSandbox for \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\" returns successfully" Jul 2 00:47:19.275841 env[1741]: time="2024-07-02T00:47:19.275786265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-6n2pl,Uid:e47755dc-6f4c-4829-80cc-fcd3bbef85a9,Namespace:default,Attempt:1,}" Jul 2 00:47:19.309763 kubelet[2141]: I0702 00:47:19.309661 2141 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-79tnn" podStartSLOduration=29.415328981 podStartE2EDuration="32.309638656s" podCreationTimestamp="2024-07-02 00:46:47 +0000 UTC" firstStartedPulling="2024-07-02 00:47:15.858474719 +0000 UTC m=+30.230405617" lastFinishedPulling="2024-07-02 00:47:18.752784382 +0000 UTC m=+33.124715292" observedRunningTime="2024-07-02 00:47:19.309105513 +0000 UTC m=+33.681036447" watchObservedRunningTime="2024-07-02 00:47:19.309638656 +0000 UTC m=+33.681569603" Jul 2 00:47:19.475886 (udev-worker)[3208]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:47:19.484639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:47:19.484805 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidaf4ed735e5: link becomes ready Jul 2 00:47:19.479960 systemd-networkd[1462]: calidaf4ed735e5: Link UP Jul 2 00:47:19.484769 systemd-networkd[1462]: calidaf4ed735e5: Gained carrier Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.361 [INFO][3439] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0 nginx-deployment-85f456d6dd- default e47755dc-6f4c-4829-80cc-fcd3bbef85a9 1060 0 2024-07-02 00:47:05 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.71 nginx-deployment-85f456d6dd-6n2pl eth0 default [] [] [kns.default ksa.default.default] calidaf4ed735e5 [] []}} ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.361 [INFO][3439] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.405 [INFO][3452] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" HandleID="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.424 [INFO][3452] ipam_plugin.go 264: Auto assigning IP ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" HandleID="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318b00), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.71", "pod":"nginx-deployment-85f456d6dd-6n2pl", "timestamp":"2024-07-02 00:47:19.405419638 +0000 UTC"}, Hostname:"172.31.22.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.424 [INFO][3452] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.425 [INFO][3452] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.425 [INFO][3452] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.71' Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.427 [INFO][3452] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.433 [INFO][3452] ipam.go 372: Looking up existing affinities for host host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.440 [INFO][3452] ipam.go 489: Trying affinity for 192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.443 [INFO][3452] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.447 [INFO][3452] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.447 [INFO][3452] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.450 [INFO][3452] ipam.go 1685: Creating new handle: k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6 Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.455 [INFO][3452] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.464 [INFO][3452] ipam.go 1216: Successfully claimed IPs: [192.168.125.66/26] block=192.168.125.64/26 handle="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.464 [INFO][3452] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.66/26] handle="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" host="172.31.22.71" Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.464 [INFO][3452] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:19.504633 env[1741]: 2024-07-02 00:47:19.464 [INFO][3452] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.125.66/26] IPv6=[] ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" HandleID="k8s-pod-network.2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.505990 env[1741]: 2024-07-02 00:47:19.467 [INFO][3439] k8s.go 386: Populated endpoint ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e47755dc-6f4c-4829-80cc-fcd3bbef85a9", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-6n2pl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidaf4ed735e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:19.505990 env[1741]: 2024-07-02 00:47:19.467 [INFO][3439] k8s.go 387: Calico CNI using IPs: [192.168.125.66/32] ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.505990 env[1741]: 2024-07-02 00:47:19.467 [INFO][3439] dataplane_linux.go 68: Setting the host side veth name to calidaf4ed735e5 ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.505990 env[1741]: 2024-07-02 00:47:19.485 [INFO][3439] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.505990 env[1741]: 2024-07-02 00:47:19.486 [INFO][3439] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e47755dc-6f4c-4829-80cc-fcd3bbef85a9", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6", Pod:"nginx-deployment-85f456d6dd-6n2pl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidaf4ed735e5", MAC:"26:54:79:8c:9a:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:19.505990 env[1741]: 2024-07-02 00:47:19.496 [INFO][3439] k8s.go 500: Wrote updated endpoint to datastore ContainerID="2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6" Namespace="default" Pod="nginx-deployment-85f456d6dd-6n2pl" WorkloadEndpoint="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:19.529695 env[1741]: time="2024-07-02T00:47:19.528532020Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:47:19.529695 env[1741]: time="2024-07-02T00:47:19.528687135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:47:19.529695 env[1741]: time="2024-07-02T00:47:19.528731009Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:47:19.529695 env[1741]: time="2024-07-02T00:47:19.528960393Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6 pid=3477 runtime=io.containerd.runc.v2 Jul 2 00:47:19.539000 audit[3488]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3488 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:19.539000 audit[3488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffdab3cc30 a2=0 a3=ffff8d84dfa8 items=0 ppid=2882 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:19.539000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:19.560458 systemd[1]: Started cri-containerd-2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6.scope. Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.591000 audit: BPF prog-id=98 op=LOAD Jul 2 00:47:19.593000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.593000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3477 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393866646139646332333337633338373132363462643533653930 Jul 2 00:47:19.593000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.593000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3477 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393866646139646332333337633338373132363462643533653930 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.594000 audit: BPF prog-id=99 op=LOAD Jul 2 00:47:19.594000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3477 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:19.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393866646139646332333337633338373132363462643533653930 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.595000 audit: BPF prog-id=100 op=LOAD Jul 2 00:47:19.595000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3477 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:19.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393866646139646332333337633338373132363462643533653930 Jul 2 00:47:19.597000 audit: BPF prog-id=100 op=UNLOAD Jul 2 00:47:19.597000 audit: BPF prog-id=99 op=UNLOAD Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:19.597000 audit: BPF prog-id=101 op=LOAD Jul 2 00:47:19.597000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3477 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:19.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393866646139646332333337633338373132363462643533653930 Jul 2 00:47:19.642896 env[1741]: time="2024-07-02T00:47:19.642829144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-6n2pl,Uid:e47755dc-6f4c-4829-80cc-fcd3bbef85a9,Namespace:default,Attempt:1,} returns sandbox id \"2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6\"" Jul 2 00:47:19.646390 env[1741]: time="2024-07-02T00:47:19.646319893Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 00:47:19.777155 systemd[1]: run-netns-cni\x2deb57189d\x2df053\x2dc862\x2d76b6\x2d6cacf8d15ab0.mount: Deactivated successfully. Jul 2 00:47:19.936715 kubelet[2141]: E0702 00:47:19.936637 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:20.726131 systemd-networkd[1462]: calidaf4ed735e5: Gained IPv6LL Jul 2 00:47:20.937002 kubelet[2141]: E0702 00:47:20.936936 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:21.018477 amazon-ssm-agent[1765]: 2024-07-02 00:47:21 INFO [HealthCheck] HealthCheck reporting agent health. Jul 2 00:47:21.937708 kubelet[2141]: E0702 00:47:21.937644 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:22.938147 kubelet[2141]: E0702 00:47:22.938087 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:23.119686 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1742050314.mount: Deactivated successfully. Jul 2 00:47:23.938470 kubelet[2141]: E0702 00:47:23.938415 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:24.939118 kubelet[2141]: E0702 00:47:24.939040 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:25.277419 env[1741]: time="2024-07-02T00:47:25.276967858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:25.280640 env[1741]: time="2024-07-02T00:47:25.280549684Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:25.285816 env[1741]: time="2024-07-02T00:47:25.285732290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:25.289487 env[1741]: time="2024-07-02T00:47:25.289404175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:25.291426 env[1741]: time="2024-07-02T00:47:25.291337402Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653\"" Jul 2 00:47:25.297101 env[1741]: time="2024-07-02T00:47:25.297026378Z" level=info msg="CreateContainer within sandbox \"2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 00:47:25.322900 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3931921802.mount: Deactivated successfully. Jul 2 00:47:25.336356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3865287201.mount: Deactivated successfully. Jul 2 00:47:25.338237 env[1741]: time="2024-07-02T00:47:25.338133066Z" level=info msg="CreateContainer within sandbox \"2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3f481f8e928cd90dc6c8ccaea0745521ee7f893b7bc1bc92cc0db13848ff9139\"" Jul 2 00:47:25.339636 env[1741]: time="2024-07-02T00:47:25.339539805Z" level=info msg="StartContainer for \"3f481f8e928cd90dc6c8ccaea0745521ee7f893b7bc1bc92cc0db13848ff9139\"" Jul 2 00:47:25.375799 systemd[1]: Started cri-containerd-3f481f8e928cd90dc6c8ccaea0745521ee7f893b7bc1bc92cc0db13848ff9139.scope. Jul 2 00:47:25.413526 kernel: kauditd_printk_skb: 196 callbacks suppressed Jul 2 00:47:25.413686 kernel: audit: type=1400 audit(1719881245.404:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420396 kernel: audit: type=1400 audit(1719881245.410:646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.427502 kernel: audit: type=1400 audit(1719881245.410:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.434482 kernel: audit: type=1400 audit(1719881245.410:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.441620 kernel: audit: type=1400 audit(1719881245.410:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.450024 kernel: audit: type=1400 audit(1719881245.410:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.464653 kernel: audit: type=1400 audit(1719881245.410:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.464813 kernel: audit: type=1400 audit(1719881245.410:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.474662 kernel: audit: type=1400 audit(1719881245.410:653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.482190 kernel: audit: type=1400 audit(1719881245.412:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.412000 audit: BPF prog-id=102 op=LOAD Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3477 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:25.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343831663865393238636439306463366338636361656130373435 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3477 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:25.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343831663865393238636439306463366338636361656130373435 Jul 2 00:47:25.483403 env[1741]: time="2024-07-02T00:47:25.483357434Z" level=info msg="StartContainer for \"3f481f8e928cd90dc6c8ccaea0745521ee7f893b7bc1bc92cc0db13848ff9139\" returns successfully" Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.413000 audit: BPF prog-id=103 op=LOAD Jul 2 00:47:25.413000 audit[3539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3477 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:25.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343831663865393238636439306463366338636361656130373435 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.419000 audit: BPF prog-id=104 op=LOAD Jul 2 00:47:25.419000 audit[3539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3477 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:25.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343831663865393238636439306463366338636361656130373435 Jul 2 00:47:25.419000 audit: BPF prog-id=104 op=UNLOAD Jul 2 00:47:25.420000 audit: BPF prog-id=103 op=UNLOAD Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:25.420000 audit: BPF prog-id=105 op=LOAD Jul 2 00:47:25.420000 audit[3539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3477 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:25.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343831663865393238636439306463366338636361656130373435 Jul 2 00:47:25.940241 kubelet[2141]: E0702 00:47:25.940163 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:26.910630 kubelet[2141]: E0702 00:47:26.910588 2141 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:26.941175 kubelet[2141]: E0702 00:47:26.941130 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:27.941300 kubelet[2141]: E0702 00:47:27.941237 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:28.941683 kubelet[2141]: E0702 00:47:28.941643 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:29.942789 kubelet[2141]: E0702 00:47:29.942722 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:30.943861 kubelet[2141]: E0702 00:47:30.943803 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:31.944362 kubelet[2141]: E0702 00:47:31.944320 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:31.974000 audit[3590]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:31.978850 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 00:47:31.978960 kernel: audit: type=1325 audit(1719881251.974:663): table=filter:79 family=2 entries=20 op=nft_register_rule pid=3590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:31.974000 audit[3590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff2778230 a2=0 a3=1 items=0 ppid=2311 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.994224 kernel: audit: type=1300 audit(1719881251.974:663): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff2778230 a2=0 a3=1 items=0 ppid=2311 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:31.999626 kernel: audit: type=1327 audit(1719881251.974:663): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:31.975000 audit[3590]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=3590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.005766 kernel: audit: type=1325 audit(1719881251.975:664): table=nat:80 family=2 entries=20 op=nft_register_rule pid=3590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:31.975000 audit[3590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff2778230 a2=0 a3=1 items=0 ppid=2311 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:31.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.020988 kernel: audit: type=1300 audit(1719881251.975:664): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff2778230 a2=0 a3=1 items=0 ppid=2311 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.021054 kernel: audit: type=1327 audit(1719881251.975:664): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.006000 audit[3592]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=3592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.026099 kernel: audit: type=1325 audit(1719881252.006:665): table=filter:81 family=2 entries=32 op=nft_register_rule pid=3592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.006000 audit[3592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffceadb410 a2=0 a3=1 items=0 ppid=2311 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.036022 kernel: audit: type=1300 audit(1719881252.006:665): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffceadb410 a2=0 a3=1 items=0 ppid=2311 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.040852 kernel: audit: type=1327 audit(1719881252.006:665): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.007000 audit[3592]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=3592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.045803 kernel: audit: type=1325 audit(1719881252.007:666): table=nat:82 family=2 entries=20 op=nft_register_rule pid=3592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:32.007000 audit[3592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffceadb410 a2=0 a3=1 items=0 ppid=2311 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.007000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:32.148961 kubelet[2141]: I0702 00:47:32.148873 2141 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-6n2pl" podStartSLOduration=21.49969381 podStartE2EDuration="27.148830283s" podCreationTimestamp="2024-07-02 00:47:05 +0000 UTC" firstStartedPulling="2024-07-02 00:47:19.645359156 +0000 UTC m=+34.017290067" lastFinishedPulling="2024-07-02 00:47:25.294495606 +0000 UTC m=+39.666426540" observedRunningTime="2024-07-02 00:47:26.324598491 +0000 UTC m=+40.696529425" watchObservedRunningTime="2024-07-02 00:47:32.148830283 +0000 UTC m=+46.520761229" Jul 2 00:47:32.149359 kubelet[2141]: I0702 00:47:32.149309 2141 topology_manager.go:215] "Topology Admit Handler" podUID="1c7b2bb2-b856-46d3-84bd-a83478669197" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 00:47:32.167182 systemd[1]: Created slice kubepods-besteffort-pod1c7b2bb2_b856_46d3_84bd_a83478669197.slice. Jul 2 00:47:32.196025 kubelet[2141]: I0702 00:47:32.195901 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-58cnj\" (UniqueName: \"kubernetes.io/projected/1c7b2bb2-b856-46d3-84bd-a83478669197-kube-api-access-58cnj\") pod \"nfs-server-provisioner-0\" (UID: \"1c7b2bb2-b856-46d3-84bd-a83478669197\") " pod="default/nfs-server-provisioner-0" Jul 2 00:47:32.196762 kubelet[2141]: I0702 00:47:32.196728 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/1c7b2bb2-b856-46d3-84bd-a83478669197-data\") pod \"nfs-server-provisioner-0\" (UID: \"1c7b2bb2-b856-46d3-84bd-a83478669197\") " pod="default/nfs-server-provisioner-0" Jul 2 00:47:32.473929 env[1741]: time="2024-07-02T00:47:32.473750272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1c7b2bb2-b856-46d3-84bd-a83478669197,Namespace:default,Attempt:0,}" Jul 2 00:47:32.815496 systemd-networkd[1462]: cali60e51b789ff: Link UP Jul 2 00:47:32.821716 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:47:32.821870 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 00:47:32.822548 systemd-networkd[1462]: cali60e51b789ff: Gained carrier Jul 2 00:47:32.825510 (udev-worker)[3625]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.571 [INFO][3601] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.71-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 1c7b2bb2-b856-46d3-84bd-a83478669197 1115 0 2024-07-02 00:47:32 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.22.71 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.571 [INFO][3601] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.640 [INFO][3612] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" HandleID="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Workload="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.683 [INFO][3612] ipam_plugin.go 264: Auto assigning IP ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" HandleID="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Workload="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400031a2d0), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.71", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 00:47:32.64007634 +0000 UTC"}, Hostname:"172.31.22.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.684 [INFO][3612] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.684 [INFO][3612] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.684 [INFO][3612] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.71' Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.687 [INFO][3612] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.712 [INFO][3612] ipam.go 372: Looking up existing affinities for host host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.731 [INFO][3612] ipam.go 489: Trying affinity for 192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.741 [INFO][3612] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.758 [INFO][3612] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.758 [INFO][3612] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.763 [INFO][3612] ipam.go 1685: Creating new handle: k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.776 [INFO][3612] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.806 [INFO][3612] ipam.go 1216: Successfully claimed IPs: [192.168.125.67/26] block=192.168.125.64/26 handle="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.806 [INFO][3612] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.67/26] handle="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" host="172.31.22.71" Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.806 [INFO][3612] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:32.857023 env[1741]: 2024-07-02 00:47:32.806 [INFO][3612] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.125.67/26] IPv6=[] ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" HandleID="k8s-pod-network.5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Workload="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" Jul 2 00:47:32.858331 env[1741]: 2024-07-02 00:47:32.809 [INFO][3601] k8s.go 386: Populated endpoint ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1c7b2bb2-b856-46d3-84bd-a83478669197", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:32.858331 env[1741]: 2024-07-02 00:47:32.809 [INFO][3601] k8s.go 387: Calico CNI using IPs: [192.168.125.67/32] ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" Jul 2 00:47:32.858331 env[1741]: 2024-07-02 00:47:32.810 [INFO][3601] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" Jul 2 00:47:32.858331 env[1741]: 2024-07-02 00:47:32.825 [INFO][3601] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" Jul 2 00:47:32.858716 env[1741]: 2024-07-02 00:47:32.827 [INFO][3601] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1c7b2bb2-b856-46d3-84bd-a83478669197", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"82:e7:f4:dd:1e:8d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:32.858716 env[1741]: 2024-07-02 00:47:32.854 [INFO][3601] k8s.go 500: Wrote updated endpoint to datastore ContainerID="5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.71-k8s-nfs--server--provisioner--0-eth0" Jul 2 00:47:32.882759 env[1741]: time="2024-07-02T00:47:32.882394041Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:47:32.882759 env[1741]: time="2024-07-02T00:47:32.882467963Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:47:32.882759 env[1741]: time="2024-07-02T00:47:32.882493575Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:47:32.883217 env[1741]: time="2024-07-02T00:47:32.883144494Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e pid=3644 runtime=io.containerd.runc.v2 Jul 2 00:47:32.929293 systemd[1]: Started cri-containerd-5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e.scope. Jul 2 00:47:32.945231 kubelet[2141]: E0702 00:47:32.945156 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.958000 audit: BPF prog-id=106 op=LOAD Jul 2 00:47:32.960000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.960000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3644 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633466656661616665616639303839336135373232643033643730 Jul 2 00:47:32.960000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.960000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3644 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633466656661616665616639303839336135373232643033643730 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.961000 audit: BPF prog-id=107 op=LOAD Jul 2 00:47:32.961000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3644 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633466656661616665616639303839336135373232643033643730 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.962000 audit: BPF prog-id=108 op=LOAD Jul 2 00:47:32.962000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3644 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633466656661616665616639303839336135373232643033643730 Jul 2 00:47:32.963000 audit: BPF prog-id=108 op=UNLOAD Jul 2 00:47:32.964000 audit: BPF prog-id=107 op=UNLOAD Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:32.964000 audit: BPF prog-id=109 op=LOAD Jul 2 00:47:32.964000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3644 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633466656661616665616639303839336135373232643033643730 Jul 2 00:47:32.972000 audit[3673]: NETFILTER_CFG table=filter:83 family=2 entries=44 op=nft_register_chain pid=3673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:32.972000 audit[3673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22672 a0=3 a1=ffffc37ff240 a2=0 a3=ffffaa559fa8 items=0 ppid=2882 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:32.972000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:33.012553 env[1741]: time="2024-07-02T00:47:33.012496485Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1c7b2bb2-b856-46d3-84bd-a83478669197,Namespace:default,Attempt:0,} returns sandbox id \"5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e\"" Jul 2 00:47:33.015907 env[1741]: time="2024-07-02T00:47:33.015830283Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 00:47:33.334905 systemd[1]: run-containerd-runc-k8s.io-5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e-runc.jkfnQ1.mount: Deactivated successfully. Jul 2 00:47:33.945850 kubelet[2141]: E0702 00:47:33.945767 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:34.677766 systemd-networkd[1462]: cali60e51b789ff: Gained IPv6LL Jul 2 00:47:34.946880 kubelet[2141]: E0702 00:47:34.946746 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:35.947803 kubelet[2141]: E0702 00:47:35.947744 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:36.489004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3056250379.mount: Deactivated successfully. Jul 2 00:47:36.948089 kubelet[2141]: E0702 00:47:36.948018 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:37.949007 kubelet[2141]: E0702 00:47:37.948906 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:38.950029 kubelet[2141]: E0702 00:47:38.949935 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:39.234587 systemd[1]: run-containerd-runc-k8s.io-f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017-runc.ro1uPZ.mount: Deactivated successfully. Jul 2 00:47:39.950859 kubelet[2141]: E0702 00:47:39.950814 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:40.116523 env[1741]: time="2024-07-02T00:47:40.116464880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:40.120424 env[1741]: time="2024-07-02T00:47:40.120373368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:40.124031 env[1741]: time="2024-07-02T00:47:40.123968575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:40.127475 env[1741]: time="2024-07-02T00:47:40.127424453Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:40.128990 env[1741]: time="2024-07-02T00:47:40.128927924Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Jul 2 00:47:40.134392 env[1741]: time="2024-07-02T00:47:40.134337879Z" level=info msg="CreateContainer within sandbox \"5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 00:47:40.154729 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2782730031.mount: Deactivated successfully. Jul 2 00:47:40.168701 env[1741]: time="2024-07-02T00:47:40.168618319Z" level=info msg="CreateContainer within sandbox \"5ac4fefaafeaf90893a5722d03d701f5aac21db8bb4c0e77dffffb42725a175e\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5f734782f3743219c5f297268fe19df54c236338c4834a027aa42b38e99b1656\"" Jul 2 00:47:40.169944 env[1741]: time="2024-07-02T00:47:40.169899433Z" level=info msg="StartContainer for \"5f734782f3743219c5f297268fe19df54c236338c4834a027aa42b38e99b1656\"" Jul 2 00:47:40.204287 systemd[1]: Started cri-containerd-5f734782f3743219c5f297268fe19df54c236338c4834a027aa42b38e99b1656.scope. Jul 2 00:47:40.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.245183 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 00:47:40.245270 kernel: audit: type=1400 audit(1719881260.242:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257822 kernel: audit: type=1400 audit(1719881260.248:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264144 kernel: audit: type=1400 audit(1719881260.248:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264284 kernel: audit: type=1400 audit(1719881260.248:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.276800 kernel: audit: type=1400 audit(1719881260.248:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.277343 kernel: audit: type=1400 audit(1719881260.248:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.290094 kernel: audit: type=1400 audit(1719881260.248:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.290189 kernel: audit: type=1400 audit(1719881260.248:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.302545 kernel: audit: type=1400 audit(1719881260.248:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.309342 kernel: audit: type=1400 audit(1719881260.250:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.250000 audit: BPF prog-id=110 op=LOAD Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3644 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:40.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373334373832663337343332313963356632393732363866653139 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3644 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:40.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373334373832663337343332313963356632393732363866653139 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.251000 audit: BPF prog-id=111 op=LOAD Jul 2 00:47:40.251000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3644 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:40.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373334373832663337343332313963356632393732363866653139 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.257000 audit: BPF prog-id=112 op=LOAD Jul 2 00:47:40.257000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3644 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:40.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373334373832663337343332313963356632393732363866653139 Jul 2 00:47:40.263000 audit: BPF prog-id=112 op=UNLOAD Jul 2 00:47:40.263000 audit: BPF prog-id=111 op=UNLOAD Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:40.264000 audit: BPF prog-id=113 op=LOAD Jul 2 00:47:40.264000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3644 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:40.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373334373832663337343332313963356632393732363866653139 Jul 2 00:47:40.333379 env[1741]: time="2024-07-02T00:47:40.333299809Z" level=info msg="StartContainer for \"5f734782f3743219c5f297268fe19df54c236338c4834a027aa42b38e99b1656\" returns successfully" Jul 2 00:47:40.365438 kubelet[2141]: I0702 00:47:40.365341 2141 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.249079921 podStartE2EDuration="8.365321509s" podCreationTimestamp="2024-07-02 00:47:32 +0000 UTC" firstStartedPulling="2024-07-02 00:47:33.015016907 +0000 UTC m=+47.386947805" lastFinishedPulling="2024-07-02 00:47:40.131258483 +0000 UTC m=+54.503189393" observedRunningTime="2024-07-02 00:47:40.364539163 +0000 UTC m=+54.736470097" watchObservedRunningTime="2024-07-02 00:47:40.365321509 +0000 UTC m=+54.737252443" Jul 2 00:47:40.388000 audit[3744]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=3744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:40.388000 audit[3744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdaa7ef70 a2=0 a3=1 items=0 ppid=2311 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:40.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:40.393000 audit[3744]: NETFILTER_CFG table=nat:85 family=2 entries=104 op=nft_register_chain pid=3744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:40.393000 audit[3744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffdaa7ef70 a2=0 a3=1 items=0 ppid=2311 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:40.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:40.442000 audit[3746]: AVC avc: denied { search } for pid=3746 comm="rpcbind" name="crypto" dev="proc" ino=18861 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 00:47:40.442000 audit[3746]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8aa6f000 a2=0 a3=0 items=0 ppid=3725 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 key=(null) Jul 2 00:47:40.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 00:47:40.521000 audit[3751]: AVC avc: denied { search } for pid=3751 comm="dbus-daemon" name="crypto" dev="proc" ino=18861 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 00:47:40.521000 audit[3751]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffaee8f000 a2=0 a3=0 items=0 ppid=3725 pid=3751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 key=(null) Jul 2 00:47:40.521000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 00:47:40.529000 audit[3752]: AVC avc: denied { watch } for pid=3752 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=535832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c118,c980 tclass=dir permissive=0 Jul 2 00:47:40.529000 audit[3752]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaad5f14710 a2=2c8 a3=aaaad5f06a60 items=0 ppid=3725 pid=3752 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 key=(null) Jul 2 00:47:40.529000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 00:47:40.539000 audit[3753]: AVC avc: denied { read } for pid=3753 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18952 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 00:47:40.539000 audit[3753]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb6fba570 a2=80000 a3=0 items=0 ppid=3725 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 key=(null) Jul 2 00:47:40.539000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 00:47:40.540000 audit[3753]: AVC avc: denied { search } for pid=3753 comm="ganesha.nfsd" name="crypto" dev="proc" ino=18861 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 00:47:40.540000 audit[3753]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb634f000 a2=0 a3=0 items=0 ppid=3725 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c980 key=(null) Jul 2 00:47:40.540000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 00:47:40.952764 kubelet[2141]: E0702 00:47:40.952708 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:41.953199 kubelet[2141]: E0702 00:47:41.953139 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:42.217000 audit[3758]: NETFILTER_CFG table=filter:86 family=2 entries=9 op=nft_register_rule pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:42.217000 audit[3758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff89db090 a2=0 a3=1 items=0 ppid=2311 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:42.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:42.221000 audit[3758]: NETFILTER_CFG table=nat:87 family=2 entries=44 op=nft_register_rule pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:42.221000 audit[3758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffff89db090 a2=0 a3=1 items=0 ppid=2311 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:42.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:42.235000 audit[3760]: NETFILTER_CFG table=filter:88 family=2 entries=10 op=nft_register_rule pid=3760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:42.235000 audit[3760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdb73a970 a2=0 a3=1 items=0 ppid=2311 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:42.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:42.238654 kubelet[2141]: I0702 00:47:42.238586 2141 topology_manager.go:215] "Topology Admit Handler" podUID="d4db1b4a-1fbd-4fe5-bb58-20501fde4361" podNamespace="calico-apiserver" podName="calico-apiserver-5bbdf7f7c6-5898k" Jul 2 00:47:42.244000 audit[3760]: NETFILTER_CFG table=nat:89 family=2 entries=44 op=nft_register_rule pid=3760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:42.244000 audit[3760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffdb73a970 a2=0 a3=1 items=0 ppid=2311 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:42.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:42.250432 systemd[1]: Created slice kubepods-besteffort-podd4db1b4a_1fbd_4fe5_bb58_20501fde4361.slice. Jul 2 00:47:42.365182 kubelet[2141]: I0702 00:47:42.365125 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d4db1b4a-1fbd-4fe5-bb58-20501fde4361-calico-apiserver-certs\") pod \"calico-apiserver-5bbdf7f7c6-5898k\" (UID: \"d4db1b4a-1fbd-4fe5-bb58-20501fde4361\") " pod="calico-apiserver/calico-apiserver-5bbdf7f7c6-5898k" Jul 2 00:47:42.365383 kubelet[2141]: I0702 00:47:42.365191 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zpfrm\" (UniqueName: \"kubernetes.io/projected/d4db1b4a-1fbd-4fe5-bb58-20501fde4361-kube-api-access-zpfrm\") pod \"calico-apiserver-5bbdf7f7c6-5898k\" (UID: \"d4db1b4a-1fbd-4fe5-bb58-20501fde4361\") " pod="calico-apiserver/calico-apiserver-5bbdf7f7c6-5898k" Jul 2 00:47:42.466759 kubelet[2141]: E0702 00:47:42.466708 2141 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 00:47:42.466927 kubelet[2141]: E0702 00:47:42.466804 2141 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d4db1b4a-1fbd-4fe5-bb58-20501fde4361-calico-apiserver-certs podName:d4db1b4a-1fbd-4fe5-bb58-20501fde4361 nodeName:}" failed. No retries permitted until 2024-07-02 00:47:42.966780358 +0000 UTC m=+57.338711268 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d4db1b4a-1fbd-4fe5-bb58-20501fde4361-calico-apiserver-certs") pod "calico-apiserver-5bbdf7f7c6-5898k" (UID: "d4db1b4a-1fbd-4fe5-bb58-20501fde4361") : secret "calico-apiserver-certs" not found Jul 2 00:47:42.954134 kubelet[2141]: E0702 00:47:42.954079 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:43.157717 env[1741]: time="2024-07-02T00:47:43.157621304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bbdf7f7c6-5898k,Uid:d4db1b4a-1fbd-4fe5-bb58-20501fde4361,Namespace:calico-apiserver,Attempt:0,}" Jul 2 00:47:43.431778 systemd-networkd[1462]: cali26aa9395788: Link UP Jul 2 00:47:43.435704 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:47:43.435843 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali26aa9395788: link becomes ready Jul 2 00:47:43.436247 systemd-networkd[1462]: cali26aa9395788: Gained carrier Jul 2 00:47:43.439364 (udev-worker)[3788]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.251 [INFO][3770] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0 calico-apiserver-5bbdf7f7c6- calico-apiserver d4db1b4a-1fbd-4fe5-bb58-20501fde4361 1198 0 2024-07-02 00:47:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5bbdf7f7c6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.22.71 calico-apiserver-5bbdf7f7c6-5898k eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali26aa9395788 [] []}} ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.251 [INFO][3770] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.302 [INFO][3781] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" HandleID="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Workload="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.339 [INFO][3781] ipam_plugin.go 264: Auto assigning IP ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" HandleID="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Workload="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003182b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.22.71", "pod":"calico-apiserver-5bbdf7f7c6-5898k", "timestamp":"2024-07-02 00:47:43.302727252 +0000 UTC"}, Hostname:"172.31.22.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.339 [INFO][3781] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.339 [INFO][3781] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.339 [INFO][3781] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.71' Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.348 [INFO][3781] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.363 [INFO][3781] ipam.go 372: Looking up existing affinities for host host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.375 [INFO][3781] ipam.go 489: Trying affinity for 192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.381 [INFO][3781] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.387 [INFO][3781] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.387 [INFO][3781] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.393 [INFO][3781] ipam.go 1685: Creating new handle: k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.409 [INFO][3781] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.422 [INFO][3781] ipam.go 1216: Successfully claimed IPs: [192.168.125.68/26] block=192.168.125.64/26 handle="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.422 [INFO][3781] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.68/26] handle="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" host="172.31.22.71" Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.422 [INFO][3781] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:43.456127 env[1741]: 2024-07-02 00:47:43.423 [INFO][3781] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.125.68/26] IPv6=[] ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" HandleID="k8s-pod-network.ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Workload="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" Jul 2 00:47:43.457433 env[1741]: 2024-07-02 00:47:43.425 [INFO][3770] k8s.go 386: Populated endpoint ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0", GenerateName:"calico-apiserver-5bbdf7f7c6-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4db1b4a-1fbd-4fe5-bb58-20501fde4361", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bbdf7f7c6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"", Pod:"calico-apiserver-5bbdf7f7c6-5898k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali26aa9395788", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:43.457433 env[1741]: 2024-07-02 00:47:43.425 [INFO][3770] k8s.go 387: Calico CNI using IPs: [192.168.125.68/32] ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" Jul 2 00:47:43.457433 env[1741]: 2024-07-02 00:47:43.426 [INFO][3770] dataplane_linux.go 68: Setting the host side veth name to cali26aa9395788 ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" Jul 2 00:47:43.457433 env[1741]: 2024-07-02 00:47:43.436 [INFO][3770] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" Jul 2 00:47:43.457433 env[1741]: 2024-07-02 00:47:43.438 [INFO][3770] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0", GenerateName:"calico-apiserver-5bbdf7f7c6-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4db1b4a-1fbd-4fe5-bb58-20501fde4361", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bbdf7f7c6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc", Pod:"calico-apiserver-5bbdf7f7c6-5898k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali26aa9395788", MAC:"c6:46:bf:b3:83:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:43.457433 env[1741]: 2024-07-02 00:47:43.450 [INFO][3770] k8s.go 500: Wrote updated endpoint to datastore ContainerID="ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc" Namespace="calico-apiserver" Pod="calico-apiserver-5bbdf7f7c6-5898k" WorkloadEndpoint="172.31.22.71-k8s-calico--apiserver--5bbdf7f7c6--5898k-eth0" Jul 2 00:47:43.488950 env[1741]: time="2024-07-02T00:47:43.488828144Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:47:43.489220 env[1741]: time="2024-07-02T00:47:43.489170298Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:47:43.488000 audit[3812]: NETFILTER_CFG table=filter:90 family=2 entries=47 op=nft_register_chain pid=3812 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:47:43.488000 audit[3812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25072 a0=3 a1=ffffc2d987d0 a2=0 a3=ffff9eee0fa8 items=0 ppid=2882 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:43.488000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:47:43.490273 env[1741]: time="2024-07-02T00:47:43.490176081Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:47:43.490847 env[1741]: time="2024-07-02T00:47:43.490774961Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc pid=3811 runtime=io.containerd.runc.v2 Jul 2 00:47:43.521360 systemd[1]: Started cri-containerd-ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc.scope. Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.569000 audit: BPF prog-id=114 op=LOAD Jul 2 00:47:43.571000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.571000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3811 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:43.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464633733363434633164393636396437646361613863646265313830 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3811 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:43.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464633733363434633164393636396437646361613863646265313830 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.572000 audit: BPF prog-id=115 op=LOAD Jul 2 00:47:43.572000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3811 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:43.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464633733363434633164393636396437646361613863646265313830 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.574000 audit: BPF prog-id=116 op=LOAD Jul 2 00:47:43.574000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3811 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:43.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464633733363434633164393636396437646361613863646265313830 Jul 2 00:47:43.575000 audit: BPF prog-id=116 op=UNLOAD Jul 2 00:47:43.575000 audit: BPF prog-id=115 op=UNLOAD Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { perfmon } for pid=3822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit[3822]: AVC avc: denied { bpf } for pid=3822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:43.575000 audit: BPF prog-id=117 op=LOAD Jul 2 00:47:43.575000 audit[3822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3811 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:43.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464633733363434633164393636396437646361613863646265313830 Jul 2 00:47:43.618768 env[1741]: time="2024-07-02T00:47:43.618710865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bbdf7f7c6-5898k,Uid:d4db1b4a-1fbd-4fe5-bb58-20501fde4361,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc\"" Jul 2 00:47:43.622879 env[1741]: time="2024-07-02T00:47:43.622829998Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 00:47:43.955557 kubelet[2141]: E0702 00:47:43.955468 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:44.956536 kubelet[2141]: E0702 00:47:44.956470 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:45.429847 systemd-networkd[1462]: cali26aa9395788: Gained IPv6LL Jul 2 00:47:45.957300 kubelet[2141]: E0702 00:47:45.957148 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:46.217337 env[1741]: time="2024-07-02T00:47:46.217172056Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:46.227316 env[1741]: time="2024-07-02T00:47:46.227236537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:46.235486 env[1741]: time="2024-07-02T00:47:46.235420143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:46.240995 env[1741]: time="2024-07-02T00:47:46.240866880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:47:46.243487 env[1741]: time="2024-07-02T00:47:46.242273996Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac\"" Jul 2 00:47:46.250023 env[1741]: time="2024-07-02T00:47:46.249939989Z" level=info msg="CreateContainer within sandbox \"ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 00:47:46.292674 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3519953782.mount: Deactivated successfully. Jul 2 00:47:46.305725 env[1741]: time="2024-07-02T00:47:46.305634661Z" level=info msg="CreateContainer within sandbox \"ddc73644c1d9669d7dcaa8cdbe180c446a99438f429bca5f32350f558fcda1fc\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a534d14fe2eb9d16a1c432c86096e83a9a8d7c32d95ec3c60c211c844a610f8e\"" Jul 2 00:47:46.307074 env[1741]: time="2024-07-02T00:47:46.307008497Z" level=info msg="StartContainer for \"a534d14fe2eb9d16a1c432c86096e83a9a8d7c32d95ec3c60c211c844a610f8e\"" Jul 2 00:47:46.359764 systemd[1]: Started cri-containerd-a534d14fe2eb9d16a1c432c86096e83a9a8d7c32d95ec3c60c211c844a610f8e.scope. Jul 2 00:47:46.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.402742 kernel: kauditd_printk_skb: 140 callbacks suppressed Jul 2 00:47:46.402835 kernel: audit: type=1400 audit(1719881266.399:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.415249 kernel: audit: type=1400 audit(1719881266.407:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.423849 kernel: audit: type=1400 audit(1719881266.407:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.435330 kernel: audit: type=1400 audit(1719881266.407:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.442958 kernel: audit: type=1400 audit(1719881266.407:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.469063 kernel: audit: type=1400 audit(1719881266.407:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.480435 kernel: audit: type=1400 audit(1719881266.407:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.489080 kernel: audit: type=1400 audit(1719881266.407:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.489196 kernel: audit: type=1400 audit(1719881266.407:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.503620 kernel: audit: type=1400 audit(1719881266.407:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.407000 audit: BPF prog-id=118 op=LOAD Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3811 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333464313466653265623964313661316334333263383630393665 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3811 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333464313466653265623964313661316334333263383630393665 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit: BPF prog-id=119 op=LOAD Jul 2 00:47:46.414000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3811 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333464313466653265623964313661316334333263383630393665 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit: BPF prog-id=120 op=LOAD Jul 2 00:47:46.414000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3811 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333464313466653265623964313661316334333263383630393665 Jul 2 00:47:46.414000 audit: BPF prog-id=120 op=UNLOAD Jul 2 00:47:46.414000 audit: BPF prog-id=119 op=UNLOAD Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:47:46.414000 audit: BPF prog-id=121 op=LOAD Jul 2 00:47:46.414000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3811 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333464313466653265623964313661316334333263383630393665 Jul 2 00:47:46.556848 env[1741]: time="2024-07-02T00:47:46.556770984Z" level=info msg="StartContainer for \"a534d14fe2eb9d16a1c432c86096e83a9a8d7c32d95ec3c60c211c844a610f8e\" returns successfully" Jul 2 00:47:46.911304 kubelet[2141]: E0702 00:47:46.911199 2141 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:46.936411 env[1741]: time="2024-07-02T00:47:46.936360779Z" level=info msg="StopPodSandbox for \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\"" Jul 2 00:47:46.957702 kubelet[2141]: E0702 00:47:46.957581 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.022 [WARNING][3896] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e47755dc-6f4c-4829-80cc-fcd3bbef85a9", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6", Pod:"nginx-deployment-85f456d6dd-6n2pl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidaf4ed735e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.023 [INFO][3896] k8s.go 608: Cleaning up netns ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.023 [INFO][3896] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" iface="eth0" netns="" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.023 [INFO][3896] k8s.go 615: Releasing IP address(es) ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.023 [INFO][3896] utils.go 188: Calico CNI releasing IP address ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.082 [INFO][3902] ipam_plugin.go 411: Releasing address using handleID ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.083 [INFO][3902] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.083 [INFO][3902] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.095 [WARNING][3902] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.095 [INFO][3902] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.098 [INFO][3902] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:47.103863 env[1741]: 2024-07-02 00:47:47.101 [INFO][3896] k8s.go 621: Teardown processing complete. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.105048 env[1741]: time="2024-07-02T00:47:47.104985063Z" level=info msg="TearDown network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\" successfully" Jul 2 00:47:47.105178 env[1741]: time="2024-07-02T00:47:47.105145751Z" level=info msg="StopPodSandbox for \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\" returns successfully" Jul 2 00:47:47.106219 env[1741]: time="2024-07-02T00:47:47.106175525Z" level=info msg="RemovePodSandbox for \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\"" Jul 2 00:47:47.106750 env[1741]: time="2024-07-02T00:47:47.106671989Z" level=info msg="Forcibly stopping sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\"" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.217 [WARNING][3923] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e47755dc-6f4c-4829-80cc-fcd3bbef85a9", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"2598fda9dc2337c3871264bd53e909332b09495a5778e48ebf7bd8ba294b91f6", Pod:"nginx-deployment-85f456d6dd-6n2pl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidaf4ed735e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.217 [INFO][3923] k8s.go 608: Cleaning up netns ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.218 [INFO][3923] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" iface="eth0" netns="" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.218 [INFO][3923] k8s.go 615: Releasing IP address(es) ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.218 [INFO][3923] utils.go 188: Calico CNI releasing IP address ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.271 [INFO][3931] ipam_plugin.go 411: Releasing address using handleID ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.272 [INFO][3931] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.272 [INFO][3931] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.285 [WARNING][3931] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.286 [INFO][3931] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" HandleID="k8s-pod-network.0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Workload="172.31.22.71-k8s-nginx--deployment--85f456d6dd--6n2pl-eth0" Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.288 [INFO][3931] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:47.293627 env[1741]: 2024-07-02 00:47:47.291 [INFO][3923] k8s.go 621: Teardown processing complete. ContainerID="0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97" Jul 2 00:47:47.295805 env[1741]: time="2024-07-02T00:47:47.295736839Z" level=info msg="TearDown network for sandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\" successfully" Jul 2 00:47:47.303450 env[1741]: time="2024-07-02T00:47:47.303332159Z" level=info msg="RemovePodSandbox \"0858eb5e770666e791b57f4efd7527a9c6ed99c86a369d50288e66e5b3558c97\" returns successfully" Jul 2 00:47:47.304346 env[1741]: time="2024-07-02T00:47:47.304287200Z" level=info msg="StopPodSandbox for \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\"" Jul 2 00:47:47.447000 audit[3962]: NETFILTER_CFG table=filter:91 family=2 entries=10 op=nft_register_rule pid=3962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:47.447000 audit[3962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffed8487e0 a2=0 a3=1 items=0 ppid=2311 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:47.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:47.451000 audit[3962]: NETFILTER_CFG table=nat:92 family=2 entries=44 op=nft_register_rule pid=3962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:47.451000 audit[3962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffed8487e0 a2=0 a3=1 items=0 ppid=2311 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:47.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.395 [WARNING][3950] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-csi--node--driver--79tnn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34f91864-803a-4e5e-82f4-cff9840978a8", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 46, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225", Pod:"csi-node-driver-79tnn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6f7c40fadf8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.396 [INFO][3950] k8s.go 608: Cleaning up netns ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.396 [INFO][3950] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" iface="eth0" netns="" Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.396 [INFO][3950] k8s.go 615: Releasing IP address(es) ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.397 [INFO][3950] utils.go 188: Calico CNI releasing IP address ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.445 [INFO][3956] ipam_plugin.go 411: Releasing address using handleID ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.446 [INFO][3956] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.446 [INFO][3956] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.462 [WARNING][3956] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.463 [INFO][3956] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.465 [INFO][3956] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:47.469701 env[1741]: 2024-07-02 00:47:47.467 [INFO][3950] k8s.go 621: Teardown processing complete. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.470998 env[1741]: time="2024-07-02T00:47:47.470947316Z" level=info msg="TearDown network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\" successfully" Jul 2 00:47:47.471141 env[1741]: time="2024-07-02T00:47:47.471107295Z" level=info msg="StopPodSandbox for \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\" returns successfully" Jul 2 00:47:47.472005 env[1741]: time="2024-07-02T00:47:47.471961008Z" level=info msg="RemovePodSandbox for \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\"" Jul 2 00:47:47.472440 env[1741]: time="2024-07-02T00:47:47.472349111Z" level=info msg="Forcibly stopping sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\"" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.537 [WARNING][3977] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-csi--node--driver--79tnn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34f91864-803a-4e5e-82f4-cff9840978a8", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 46, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"5f702b74ed001dc3d403bea52b0c7e10e4db3ed2e0ee22c2983f8d6abbdbe225", Pod:"csi-node-driver-79tnn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6f7c40fadf8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.538 [INFO][3977] k8s.go 608: Cleaning up netns ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.538 [INFO][3977] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" iface="eth0" netns="" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.538 [INFO][3977] k8s.go 615: Releasing IP address(es) ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.538 [INFO][3977] utils.go 188: Calico CNI releasing IP address ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.585 [INFO][3983] ipam_plugin.go 411: Releasing address using handleID ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.585 [INFO][3983] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.586 [INFO][3983] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.598 [WARNING][3983] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.598 [INFO][3983] ipam_plugin.go 439: Releasing address using workloadID ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" HandleID="k8s-pod-network.ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Workload="172.31.22.71-k8s-csi--node--driver--79tnn-eth0" Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.600 [INFO][3983] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:47:47.605824 env[1741]: 2024-07-02 00:47:47.602 [INFO][3977] k8s.go 621: Teardown processing complete. ContainerID="ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6" Jul 2 00:47:47.606899 env[1741]: time="2024-07-02T00:47:47.606834784Z" level=info msg="TearDown network for sandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\" successfully" Jul 2 00:47:47.612256 env[1741]: time="2024-07-02T00:47:47.612200099Z" level=info msg="RemovePodSandbox \"ef9e7d9d1d517a62d8bf82ecb86ea30b184dfc9122e61b1bb7a77b6d419821b6\" returns successfully" Jul 2 00:47:47.684000 audit[3990]: NETFILTER_CFG table=filter:93 family=2 entries=10 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:47.684000 audit[3990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffca507630 a2=0 a3=1 items=0 ppid=2311 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:47.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:47.687000 audit[3990]: NETFILTER_CFG table=nat:94 family=2 entries=44 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:47.687000 audit[3990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffca507630 a2=0 a3=1 items=0 ppid=2311 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:47.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:47.958790 kubelet[2141]: E0702 00:47:47.958524 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:48.103000 audit[3864]: AVC avc: denied { watch } for pid=3864 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_00_47_42.4130464061/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c484 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c318,c484 tclass=file permissive=0 Jul 2 00:47:48.103000 audit[3864]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a3eea0 a2=fc6 a3=0 items=0 ppid=3811 pid=3864 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c484 key=(null) Jul 2 00:47:48.103000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 00:47:48.399853 kubelet[2141]: I0702 00:47:48.399798 2141 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:47:48.823000 audit[3995]: NETFILTER_CFG table=filter:95 family=2 entries=9 op=nft_register_rule pid=3995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:48.823000 audit[3995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd4fade50 a2=0 a3=1 items=0 ppid=2311 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:48.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:48.827000 audit[3995]: NETFILTER_CFG table=nat:96 family=2 entries=51 op=nft_register_chain pid=3995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:48.827000 audit[3995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffd4fade50 a2=0 a3=1 items=0 ppid=2311 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:48.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:48.958891 kubelet[2141]: E0702 00:47:48.958840 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:49.959438 kubelet[2141]: E0702 00:47:49.959391 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:50.960191 kubelet[2141]: E0702 00:47:50.960147 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:51.961268 kubelet[2141]: E0702 00:47:51.961223 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:52.962328 kubelet[2141]: E0702 00:47:52.962264 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:53.962710 kubelet[2141]: E0702 00:47:53.962638 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:54.963535 kubelet[2141]: E0702 00:47:54.963497 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:55.964769 kubelet[2141]: E0702 00:47:55.964707 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:56.437215 kubelet[2141]: I0702 00:47:56.437158 2141 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:47:56.488759 kubelet[2141]: I0702 00:47:56.488643 2141 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5bbdf7f7c6-5898k" podStartSLOduration=11.86350492 podStartE2EDuration="14.488620068s" podCreationTimestamp="2024-07-02 00:47:42 +0000 UTC" firstStartedPulling="2024-07-02 00:47:43.621742748 +0000 UTC m=+57.993673658" lastFinishedPulling="2024-07-02 00:47:46.246857896 +0000 UTC m=+60.618788806" observedRunningTime="2024-07-02 00:47:47.409713722 +0000 UTC m=+61.781644644" watchObservedRunningTime="2024-07-02 00:47:56.488620068 +0000 UTC m=+70.860551002" Jul 2 00:47:56.518151 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 00:47:56.518309 kernel: audit: type=1325 audit(1719881276.510:759): table=filter:97 family=2 entries=8 op=nft_register_rule pid=4026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:56.510000 audit[4026]: NETFILTER_CFG table=filter:97 family=2 entries=8 op=nft_register_rule pid=4026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:56.510000 audit[4026]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc0f13030 a2=0 a3=1 items=0 ppid=2311 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:56.528772 kernel: audit: type=1300 audit(1719881276.510:759): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc0f13030 a2=0 a3=1 items=0 ppid=2311 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:56.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:56.533699 kernel: audit: type=1327 audit(1719881276.510:759): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:56.513000 audit[4026]: NETFILTER_CFG table=nat:98 family=2 entries=58 op=nft_register_chain pid=4026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:56.538720 kernel: audit: type=1325 audit(1719881276.513:760): table=nat:98 family=2 entries=58 op=nft_register_chain pid=4026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:47:56.513000 audit[4026]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffc0f13030 a2=0 a3=1 items=0 ppid=2311 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:56.548646 kernel: audit: type=1300 audit(1719881276.513:760): arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffc0f13030 a2=0 a3=1 items=0 ppid=2311 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:47:56.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:56.553558 kernel: audit: type=1327 audit(1719881276.513:760): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:47:56.965275 kubelet[2141]: E0702 00:47:56.965209 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:57.965655 kubelet[2141]: E0702 00:47:57.965593 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:58.966416 kubelet[2141]: E0702 00:47:58.966138 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:47:59.967493 kubelet[2141]: E0702 00:47:59.967425 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:00.967925 kubelet[2141]: E0702 00:48:00.967854 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:01.968653 kubelet[2141]: E0702 00:48:01.968612 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:02.970203 kubelet[2141]: E0702 00:48:02.970161 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:03.971965 kubelet[2141]: E0702 00:48:03.971922 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:04.972763 kubelet[2141]: E0702 00:48:04.972719 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:05.203701 kubelet[2141]: I0702 00:48:05.203635 2141 topology_manager.go:215] "Topology Admit Handler" podUID="c3dd89ce-e6b4-4947-9003-c05f2e692227" podNamespace="default" podName="test-pod-1" Jul 2 00:48:05.214079 systemd[1]: Created slice kubepods-besteffort-podc3dd89ce_e6b4_4947_9003_c05f2e692227.slice. Jul 2 00:48:05.303499 kubelet[2141]: I0702 00:48:05.303011 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-523b2355-75cf-4f09-bdc1-3cd794da7d3e\" (UniqueName: \"kubernetes.io/nfs/c3dd89ce-e6b4-4947-9003-c05f2e692227-pvc-523b2355-75cf-4f09-bdc1-3cd794da7d3e\") pod \"test-pod-1\" (UID: \"c3dd89ce-e6b4-4947-9003-c05f2e692227\") " pod="default/test-pod-1" Jul 2 00:48:05.303791 kubelet[2141]: I0702 00:48:05.303713 2141 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m57n2\" (UniqueName: \"kubernetes.io/projected/c3dd89ce-e6b4-4947-9003-c05f2e692227-kube-api-access-m57n2\") pod \"test-pod-1\" (UID: \"c3dd89ce-e6b4-4947-9003-c05f2e692227\") " pod="default/test-pod-1" Jul 2 00:48:05.437099 kernel: Failed to create system directory netfs Jul 2 00:48:05.437231 kernel: audit: type=1400 audit(1719881285.422:761): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.437286 kernel: Failed to create system directory netfs Jul 2 00:48:05.437329 kernel: Failed to create system directory netfs Jul 2 00:48:05.422000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.455282 kernel: Failed to create system directory netfs Jul 2 00:48:05.455434 kernel: audit: type=1400 audit(1719881285.422:761): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.422000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.458700 kernel: Failed to create system directory fscache Jul 2 00:48:05.458813 kernel: Failed to create system directory fscache Jul 2 00:48:05.466606 kernel: audit: type=1400 audit(1719881285.422:761): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.466738 kernel: Failed to create system directory fscache Jul 2 00:48:05.422000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.422000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.475206 kernel: audit: type=1400 audit(1719881285.422:761): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.475282 kernel: Failed to create system directory fscache Jul 2 00:48:05.422000 audit[4037]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed62b5e0 a1=12c14 a2=aaaabbb0e028 a3=aaaaed61c010 items=0 ppid=1590 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:05.486768 kernel: audit: type=1300 audit(1719881285.422:761): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed62b5e0 a1=12c14 a2=aaaabbb0e028 a3=aaaaed61c010 items=0 ppid=1590 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:05.486853 kernel: Failed to create system directory fscache Jul 2 00:48:05.422000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 00:48:05.491751 kernel: audit: type=1327 audit(1719881285.422:761): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 00:48:05.491805 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.500424 kernel: audit: type=1400 audit(1719881285.450:762): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.500498 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.509143 kernel: audit: type=1400 audit(1719881285.450:762): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.509210 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.517538 kernel: audit: type=1400 audit(1719881285.450:762): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.517614 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.525988 kernel: audit: type=1400 audit(1719881285.450:762): avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.526066 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.529260 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.530927 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.532602 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.534266 kernel: Failed to create system directory fscache Jul 2 00:48:05.450000 audit[4037]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed83e210 a1=4c344 a2=aaaabbb0e028 a3=aaaaed61c010 items=0 ppid=1590 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:05.536739 kernel: FS-Cache: Loaded Jul 2 00:48:05.450000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.574598 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.577802 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.577866 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.577931 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.581031 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.581103 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.584216 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.584290 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.587416 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.587478 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.590629 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.590708 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.593860 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.593949 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.597068 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.597144 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.600197 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.600257 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.603298 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.603358 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.606434 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.606510 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.609596 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.609657 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.612660 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.612723 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.615779 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.615879 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.618871 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.618942 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.620450 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.622076 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.625224 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.625308 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.628333 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.628381 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.631424 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.631473 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.634522 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.634619 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.637758 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.637847 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.641607 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.641690 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.643838 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.643933 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.646972 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.647021 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.650155 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.650216 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.653293 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.653344 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.656392 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.656452 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.659494 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.659555 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.662615 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.662723 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.665700 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.667310 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.667400 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.670618 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.670666 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.672185 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.673674 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.675275 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.678342 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.678404 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.679840 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.681443 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.684690 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.684763 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.687824 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.687886 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.690992 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.691040 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.692535 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.694133 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.697256 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.697304 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.700369 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.700430 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.703523 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.703621 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.706660 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.706707 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.709746 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.709794 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.712869 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.712965 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.714476 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.717682 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.717759 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.719273 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.720768 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.722373 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.723925 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.725477 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.726997 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.728591 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.730099 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.731676 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.734745 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.734840 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.737930 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.738027 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.739322 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.740938 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.744075 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.744138 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.745545 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.747130 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.748668 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.750131 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.751745 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.754851 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.754912 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.756320 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.757917 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.759395 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.760995 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.764128 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.764221 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.765621 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.767206 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.768704 kernel: Failed to create system directory sunrpc Jul 2 00:48:05.563000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.781874 kernel: RPC: Registered named UNIX socket transport module. Jul 2 00:48:05.782010 kernel: RPC: Registered udp transport module. Jul 2 00:48:05.782141 kernel: RPC: Registered tcp transport module. Jul 2 00:48:05.783306 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 00:48:05.563000 audit[4037]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed88a560 a1=14a514 a2=aaaabbb0e028 a3=aaaaed61c010 items=6 ppid=1590 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:05.563000 audit: CWD cwd="/" Jul 2 00:48:05.563000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:48:05.563000 audit: PATH item=1 name=(null) inode=20771 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:48:05.563000 audit: PATH item=2 name=(null) inode=20771 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:48:05.563000 audit: PATH item=3 name=(null) inode=20772 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:48:05.563000 audit: PATH item=4 name=(null) inode=20771 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:48:05.563000 audit: PATH item=5 name=(null) inode=20773 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:48:05.563000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.836837 kernel: Failed to create system directory nfs Jul 2 00:48:05.836981 kernel: Failed to create system directory nfs Jul 2 00:48:05.837026 kernel: Failed to create system directory nfs Jul 2 00:48:05.837073 kernel: Failed to create system directory nfs Jul 2 00:48:05.837118 kernel: Failed to create system directory nfs Jul 2 00:48:05.837174 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.838308 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.841155 kernel: Failed to create system directory nfs Jul 2 00:48:05.841261 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.844145 kernel: Failed to create system directory nfs Jul 2 00:48:05.844198 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.845541 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.847074 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.848490 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.850034 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.853135 kernel: Failed to create system directory nfs Jul 2 00:48:05.853230 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.855982 kernel: Failed to create system directory nfs Jul 2 00:48:05.856033 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.857379 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.858934 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.860348 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.861922 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.864892 kernel: Failed to create system directory nfs Jul 2 00:48:05.864994 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.866449 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.869397 kernel: Failed to create system directory nfs Jul 2 00:48:05.869445 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.870811 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.872426 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.874233 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.876785 kernel: Failed to create system directory nfs Jul 2 00:48:05.876835 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.878184 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.879718 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.881114 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.882687 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.885591 kernel: Failed to create system directory nfs Jul 2 00:48:05.885681 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.887001 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.888531 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.889938 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.891430 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.892921 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.894533 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.897308 kernel: Failed to create system directory nfs Jul 2 00:48:05.897359 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.898687 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.900197 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.901594 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.903100 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.904524 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.906048 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.907433 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.908950 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.910326 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.912003 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.914781 kernel: Failed to create system directory nfs Jul 2 00:48:05.914952 kernel: Failed to create system directory nfs Jul 2 00:48:05.821000 audit[4037]: AVC avc: denied { confidentiality } for pid=4037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.946717 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 00:48:05.821000 audit[4037]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaeda33740 a1=1158a4 a2=aaaabbb0e028 a3=aaaaed61c010 items=0 ppid=1590 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:05.821000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 00:48:05.974007 kubelet[2141]: E0702 00:48:05.973904 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.995649 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.995739 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.995800 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.998560 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.998641 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.001598 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.001697 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.004538 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.004618 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.005977 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.007506 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.008955 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.010510 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.013524 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.013625 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.014959 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.016539 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.019545 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.019659 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.022645 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.022742 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.025677 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.025726 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.028654 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.028702 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.031755 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.031853 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.034674 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.034723 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.037750 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.037800 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.040897 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.040999 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.043890 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.043940 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.046899 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.046962 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.049984 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.050076 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.052978 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.053098 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.054540 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.056005 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.057543 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.060558 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.060642 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.063560 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.063668 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.065021 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.066563 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.067999 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.069529 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.070966 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.072533 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.074020 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.075445 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.077008 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.078433 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.079991 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.081411 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.082991 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.086016 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.086079 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.094997 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.095116 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.095210 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.095281 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.095350 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.095402 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.096506 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.099605 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.099713 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.102640 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.102743 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.105676 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.105739 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.108850 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.108909 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.110193 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.111750 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.114921 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.115008 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.118060 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.118166 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.121078 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.121132 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.122561 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.124081 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.127083 kernel: Failed to create system directory nfs4 Jul 2 00:48:06.127132 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.128516 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.130067 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.131493 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.133072 kernel: Failed to create system directory nfs4 Jul 2 00:48:05.982000 audit[4043]: AVC avc: denied { confidentiality } for pid=4043 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.338113 kernel: NFS: Registering the id_resolver key type Jul 2 00:48:06.338352 kernel: Key type id_resolver registered Jul 2 00:48:06.338395 kernel: Key type id_legacy registered Jul 2 00:48:05.982000 audit[4043]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb08cb010 a1=19c0bc a2=aaaae808e028 a3=aaab02b61010 items=0 ppid=1590 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:05.982000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.359969 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.360155 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.360230 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.363231 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.363396 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.366550 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.366653 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.369678 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.369727 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.372813 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.372914 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.375944 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.376044 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.377565 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.380720 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.380781 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.383834 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.383913 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.385414 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.386902 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.388483 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.389965 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.391557 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.394669 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.394721 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.352000 audit[4044]: AVC avc: denied { confidentiality } for pid=4044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 00:48:06.397685 kernel: Failed to create system directory rpcgss Jul 2 00:48:06.352000 audit[4044]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb6bb3010 a1=5ef24 a2=aaaab8b8e028 a3=aaaab8be6010 items=0 ppid=1590 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:06.352000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 00:48:06.426849 nfsidmap[4053]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Jul 2 00:48:06.432157 nfsidmap[4054]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Jul 2 00:48:06.447000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2816 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 00:48:06.447000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2816 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 00:48:06.447000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2816 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 00:48:06.447000 audit[1944]: AVC avc: denied { watch_reads } for pid=1944 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2816 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 00:48:06.447000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae74da1e0 a2=10 a3=0 items=0 ppid=1 pid=1944 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:06.447000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 00:48:06.448000 audit[1944]: AVC avc: denied { watch_reads } for pid=1944 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2816 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 00:48:06.448000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae74da1e0 a2=10 a3=0 items=0 ppid=1 pid=1944 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:06.448000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 00:48:06.448000 audit[1944]: AVC avc: denied { watch_reads } for pid=1944 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2816 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 00:48:06.448000 audit[1944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae74da1e0 a2=10 a3=0 items=0 ppid=1 pid=1944 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:06.448000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 00:48:06.722204 env[1741]: time="2024-07-02T00:48:06.721279107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c3dd89ce-e6b4-4947-9003-c05f2e692227,Namespace:default,Attempt:0,}" Jul 2 00:48:06.910454 kubelet[2141]: E0702 00:48:06.910378 2141 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:06.919428 (udev-worker)[4039]: Network interface NamePolicy= disabled on kernel command line. Jul 2 00:48:06.921331 systemd-networkd[1462]: cali5ec59c6bf6e: Link UP Jul 2 00:48:06.927008 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:48:06.927344 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 00:48:06.927343 systemd-networkd[1462]: cali5ec59c6bf6e: Gained carrier Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.804 [INFO][4055] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.71-k8s-test--pod--1-eth0 default c3dd89ce-e6b4-4947-9003-c05f2e692227 1311 0 2024-07-02 00:47:32 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.71 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.804 [INFO][4055] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-eth0" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.854 [INFO][4066] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" HandleID="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Workload="172.31.22.71-k8s-test--pod--1-eth0" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.870 [INFO][4066] ipam_plugin.go 264: Auto assigning IP ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" HandleID="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Workload="172.31.22.71-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001fd650), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.71", "pod":"test-pod-1", "timestamp":"2024-07-02 00:48:06.854732108 +0000 UTC"}, Hostname:"172.31.22.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.871 [INFO][4066] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.871 [INFO][4066] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.871 [INFO][4066] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.71' Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.873 [INFO][4066] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.879 [INFO][4066] ipam.go 372: Looking up existing affinities for host host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.886 [INFO][4066] ipam.go 489: Trying affinity for 192.168.125.64/26 host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.889 [INFO][4066] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.892 [INFO][4066] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.893 [INFO][4066] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.895 [INFO][4066] ipam.go 1685: Creating new handle: k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47 Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.901 [INFO][4066] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.912 [INFO][4066] ipam.go 1216: Successfully claimed IPs: [192.168.125.69/26] block=192.168.125.64/26 handle="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.913 [INFO][4066] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.69/26] handle="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" host="172.31.22.71" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.913 [INFO][4066] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.913 [INFO][4066] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.125.69/26] IPv6=[] ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" HandleID="k8s-pod-network.60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Workload="172.31.22.71-k8s-test--pod--1-eth0" Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.916 [INFO][4055] k8s.go 386: Populated endpoint ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c3dd89ce-e6b4-4947-9003-c05f2e692227", ResourceVersion:"1311", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:48:06.950147 env[1741]: 2024-07-02 00:48:06.916 [INFO][4055] k8s.go 387: Calico CNI using IPs: [192.168.125.69/32] ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-eth0" Jul 2 00:48:06.951707 env[1741]: 2024-07-02 00:48:06.916 [INFO][4055] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-eth0" Jul 2 00:48:06.951707 env[1741]: 2024-07-02 00:48:06.928 [INFO][4055] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-eth0" Jul 2 00:48:06.951707 env[1741]: 2024-07-02 00:48:06.929 [INFO][4055] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.71-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c3dd89ce-e6b4-4947-9003-c05f2e692227", ResourceVersion:"1311", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 47, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.71", ContainerID:"60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"6e:0b:e6:3f:c0:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:48:06.951707 env[1741]: 2024-07-02 00:48:06.946 [INFO][4055] k8s.go 500: Wrote updated endpoint to datastore ContainerID="60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.71-k8s-test--pod--1-eth0" Jul 2 00:48:06.974091 env[1741]: time="2024-07-02T00:48:06.973880120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:48:06.974495 kubelet[2141]: E0702 00:48:06.974402 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:06.975190 env[1741]: time="2024-07-02T00:48:06.975124948Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:48:06.975382 env[1741]: time="2024-07-02T00:48:06.975322006Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:48:06.975855 env[1741]: time="2024-07-02T00:48:06.975790662Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47 pid=4094 runtime=io.containerd.runc.v2 Jul 2 00:48:06.993000 audit[4106]: NETFILTER_CFG table=filter:99 family=2 entries=38 op=nft_register_chain pid=4106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:48:06.993000 audit[4106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19384 a0=3 a1=ffffeb9774c0 a2=0 a3=ffffbbb22fa8 items=0 ppid=2882 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:06.993000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:48:07.017028 systemd[1]: Started cri-containerd-60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47.scope. Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.047000 audit: BPF prog-id=122 op=LOAD Jul 2 00:48:07.049000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.049000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001b9b38 a2=10 a3=0 items=0 ppid=4094 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656261313732313265363564613565363838363837653733363665 Jul 2 00:48:07.049000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.049000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001b95a0 a2=3c a3=0 items=0 ppid=4094 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656261313732313265363564613565363838363837653733363665 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.051000 audit: BPF prog-id=123 op=LOAD Jul 2 00:48:07.051000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001b98e0 a2=78 a3=0 items=0 ppid=4094 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656261313732313265363564613565363838363837653733363665 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.052000 audit: BPF prog-id=124 op=LOAD Jul 2 00:48:07.052000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001b9670 a2=78 a3=0 items=0 ppid=4094 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656261313732313265363564613565363838363837653733363665 Jul 2 00:48:07.054000 audit: BPF prog-id=124 op=UNLOAD Jul 2 00:48:07.054000 audit: BPF prog-id=123 op=UNLOAD Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.054000 audit: BPF prog-id=125 op=LOAD Jul 2 00:48:07.054000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001b9b40 a2=78 a3=0 items=0 ppid=4094 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630656261313732313265363564613565363838363837653733363665 Jul 2 00:48:07.102713 env[1741]: time="2024-07-02T00:48:07.102634234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c3dd89ce-e6b4-4947-9003-c05f2e692227,Namespace:default,Attempt:0,} returns sandbox id \"60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47\"" Jul 2 00:48:07.105838 env[1741]: time="2024-07-02T00:48:07.105769897Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 00:48:07.386306 env[1741]: time="2024-07-02T00:48:07.386251910Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:48:07.391065 env[1741]: time="2024-07-02T00:48:07.391016748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:48:07.394634 env[1741]: time="2024-07-02T00:48:07.394556620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:48:07.397832 env[1741]: time="2024-07-02T00:48:07.397784091Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:48:07.399178 env[1741]: time="2024-07-02T00:48:07.399133784Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653\"" Jul 2 00:48:07.403905 env[1741]: time="2024-07-02T00:48:07.403842421Z" level=info msg="CreateContainer within sandbox \"60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 00:48:07.431300 env[1741]: time="2024-07-02T00:48:07.431238669Z" level=info msg="CreateContainer within sandbox \"60eba17212e65da5e688687e7366ecf4d34cb85e2fcb41f3502192f039b5cb47\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"4a835c46954e30af908996cb3a02e68e8cbb680eb3bf9b12cf5c08d3c8f58fdb\"" Jul 2 00:48:07.432845 env[1741]: time="2024-07-02T00:48:07.432798370Z" level=info msg="StartContainer for \"4a835c46954e30af908996cb3a02e68e8cbb680eb3bf9b12cf5c08d3c8f58fdb\"" Jul 2 00:48:07.475007 systemd[1]: Started cri-containerd-4a835c46954e30af908996cb3a02e68e8cbb680eb3bf9b12cf5c08d3c8f58fdb.scope. Jul 2 00:48:07.490245 systemd[1]: run-containerd-runc-k8s.io-4a835c46954e30af908996cb3a02e68e8cbb680eb3bf9b12cf5c08d3c8f58fdb-runc.qDBIyr.mount: Deactivated successfully. Jul 2 00:48:07.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.518000 audit: BPF prog-id=126 op=LOAD Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4094 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383335633436393534653330616639303839393663623361303265 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4094 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383335633436393534653330616639303839393663623361303265 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.519000 audit: BPF prog-id=127 op=LOAD Jul 2 00:48:07.519000 audit[4136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4094 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383335633436393534653330616639303839393663623361303265 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit: BPF prog-id=128 op=LOAD Jul 2 00:48:07.520000 audit[4136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4094 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383335633436393534653330616639303839393663623361303265 Jul 2 00:48:07.520000 audit: BPF prog-id=128 op=UNLOAD Jul 2 00:48:07.520000 audit: BPF prog-id=127 op=UNLOAD Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:48:07.520000 audit: BPF prog-id=129 op=LOAD Jul 2 00:48:07.520000 audit[4136]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4094 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:48:07.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383335633436393534653330616639303839393663623361303265 Jul 2 00:48:07.554181 env[1741]: time="2024-07-02T00:48:07.554101249Z" level=info msg="StartContainer for \"4a835c46954e30af908996cb3a02e68e8cbb680eb3bf9b12cf5c08d3c8f58fdb\" returns successfully" Jul 2 00:48:07.974621 kubelet[2141]: E0702 00:48:07.974530 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:08.916951 systemd-networkd[1462]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 00:48:08.975311 kubelet[2141]: E0702 00:48:08.975249 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:09.215764 systemd[1]: run-containerd-runc-k8s.io-f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017-runc.8FRPR2.mount: Deactivated successfully. Jul 2 00:48:09.976344 kubelet[2141]: E0702 00:48:09.976302 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:10.977876 kubelet[2141]: E0702 00:48:10.977832 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:11.979414 kubelet[2141]: E0702 00:48:11.979372 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:12.980687 kubelet[2141]: E0702 00:48:12.980626 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:13.981702 kubelet[2141]: E0702 00:48:13.981641 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:14.982739 kubelet[2141]: E0702 00:48:14.982664 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:15.983830 kubelet[2141]: E0702 00:48:15.983766 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:16.984236 kubelet[2141]: E0702 00:48:16.984178 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:17.985015 kubelet[2141]: E0702 00:48:17.984944 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:18.985397 kubelet[2141]: E0702 00:48:18.985338 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:19.986364 kubelet[2141]: E0702 00:48:19.986293 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:20.987415 kubelet[2141]: E0702 00:48:20.987351 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:21.988090 kubelet[2141]: E0702 00:48:21.988016 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:22.988334 kubelet[2141]: E0702 00:48:22.988292 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:23.989751 kubelet[2141]: E0702 00:48:23.989711 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:24.990600 kubelet[2141]: E0702 00:48:24.990536 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:25.991505 kubelet[2141]: E0702 00:48:25.991438 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:26.910644 kubelet[2141]: E0702 00:48:26.910601 2141 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:26.992485 kubelet[2141]: E0702 00:48:26.992442 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:27.992945 kubelet[2141]: E0702 00:48:27.992903 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:28.673396 kubelet[2141]: E0702 00:48:28.673305 2141 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 00:48:28.994542 kubelet[2141]: E0702 00:48:28.994160 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:29.995337 kubelet[2141]: E0702 00:48:29.995272 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:30.996045 kubelet[2141]: E0702 00:48:30.996003 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:31.996917 kubelet[2141]: E0702 00:48:31.996870 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:32.997822 kubelet[2141]: E0702 00:48:32.997736 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:33.998894 kubelet[2141]: E0702 00:48:33.998856 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:34.999751 kubelet[2141]: E0702 00:48:34.999686 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:36.000295 kubelet[2141]: E0702 00:48:36.000225 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:37.000849 kubelet[2141]: E0702 00:48:37.000777 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:38.001695 kubelet[2141]: E0702 00:48:38.001652 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:38.674185 kubelet[2141]: E0702 00:48:38.674108 2141 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 00:48:39.003774 kubelet[2141]: E0702 00:48:39.003337 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:39.202300 systemd[1]: run-containerd-runc-k8s.io-f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017-runc.nhoKlK.mount: Deactivated successfully. Jul 2 00:48:40.003829 kubelet[2141]: E0702 00:48:40.003781 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:41.005313 kubelet[2141]: E0702 00:48:41.005246 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:42.006311 kubelet[2141]: E0702 00:48:42.006268 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:43.007777 kubelet[2141]: E0702 00:48:43.007709 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:44.008307 kubelet[2141]: E0702 00:48:44.008267 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:45.009863 kubelet[2141]: E0702 00:48:45.009820 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:46.011562 kubelet[2141]: E0702 00:48:46.011521 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:46.910881 kubelet[2141]: E0702 00:48:46.910826 2141 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:47.012992 kubelet[2141]: E0702 00:48:47.012947 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:48.014075 kubelet[2141]: E0702 00:48:48.014032 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:48.103000 audit[3864]: AVC avc: denied { watch } for pid=3864 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_00_47_42.4130464061/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c484 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c318,c484 tclass=file permissive=0 Jul 2 00:48:48.106530 kernel: kauditd_printk_skb: 461 callbacks suppressed Jul 2 00:48:48.106639 kernel: audit: type=1400 audit(1719881328.103:810): avc: denied { watch } for pid=3864 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_00_47_42.4130464061/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c484 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c318,c484 tclass=file permissive=0 Jul 2 00:48:48.103000 audit[3864]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400117e9c0 a2=fc6 a3=0 items=0 ppid=3811 pid=3864 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c484 key=(null) Jul 2 00:48:48.126186 kernel: audit: type=1300 audit(1719881328.103:810): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400117e9c0 a2=fc6 a3=0 items=0 ppid=3811 pid=3864 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c484 key=(null) Jul 2 00:48:48.126269 kernel: audit: type=1327 audit(1719881328.103:810): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 00:48:48.103000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 00:48:48.675056 kubelet[2141]: E0702 00:48:48.674985 2141 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 00:48:49.015780 kubelet[2141]: E0702 00:48:49.015634 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:50.016207 kubelet[2141]: E0702 00:48:50.016143 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:51.016636 kubelet[2141]: E0702 00:48:51.016555 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:52.017698 kubelet[2141]: E0702 00:48:52.017633 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:53.018669 kubelet[2141]: E0702 00:48:53.018602 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:53.764273 kubelet[2141]: E0702 00:48:53.764124 2141 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": unexpected EOF" Jul 2 00:48:53.766091 kubelet[2141]: E0702 00:48:53.766009 2141 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": dial tcp 172.31.28.181:6443: connect: connection refused" Jul 2 00:48:53.766091 kubelet[2141]: I0702 00:48:53.766074 2141 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Jul 2 00:48:53.769753 kubelet[2141]: E0702 00:48:53.769684 2141 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": dial tcp 172.31.28.181:6443: connect: connection refused" interval="200ms" Jul 2 00:48:53.971001 kubelet[2141]: E0702 00:48:53.970911 2141 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": dial tcp 172.31.28.181:6443: connect: connection refused" interval="400ms" Jul 2 00:48:54.019620 kubelet[2141]: E0702 00:48:54.019485 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:54.372363 kubelet[2141]: E0702 00:48:54.372288 2141 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": dial tcp 172.31.28.181:6443: connect: connection refused" interval="800ms" Jul 2 00:48:55.019886 kubelet[2141]: E0702 00:48:55.019825 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:56.020338 kubelet[2141]: E0702 00:48:56.020287 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:57.021779 kubelet[2141]: E0702 00:48:57.021736 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:58.023361 kubelet[2141]: E0702 00:48:58.023293 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:48:59.023482 kubelet[2141]: E0702 00:48:59.023409 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:00.024649 kubelet[2141]: E0702 00:49:00.024564 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:01.025636 kubelet[2141]: E0702 00:49:01.025592 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:02.026955 kubelet[2141]: E0702 00:49:02.026914 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:03.028658 kubelet[2141]: E0702 00:49:03.028601 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:04.029082 kubelet[2141]: E0702 00:49:04.029013 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:05.029790 kubelet[2141]: E0702 00:49:05.029724 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:05.172719 kubelet[2141]: E0702 00:49:05.172550 2141 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Jul 2 00:49:06.030656 kubelet[2141]: E0702 00:49:06.030595 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:06.910788 kubelet[2141]: E0702 00:49:06.910726 2141 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:07.031630 kubelet[2141]: E0702 00:49:07.031553 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:08.032596 kubelet[2141]: E0702 00:49:08.032508 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:09.033721 kubelet[2141]: E0702 00:49:09.033676 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:09.196551 systemd[1]: run-containerd-runc-k8s.io-f7327fb327ea2094d5bc7b81cbfbd8b36b37856b932ae0dab58a74bb1b43d017-runc.SPUMPY.mount: Deactivated successfully. Jul 2 00:49:09.345656 kubelet[2141]: E0702 00:49:09.345564 2141 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.22.71\": Get \"https://172.31.28.181:6443/api/v1/nodes/172.31.22.71?resourceVersion=0&timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Jul 2 00:49:10.034708 kubelet[2141]: E0702 00:49:10.034667 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:11.036046 kubelet[2141]: E0702 00:49:11.035980 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:12.036529 kubelet[2141]: E0702 00:49:12.036487 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:13.037665 kubelet[2141]: E0702 00:49:13.037611 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:14.038433 kubelet[2141]: E0702 00:49:14.038390 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:15.040140 kubelet[2141]: E0702 00:49:15.040098 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:16.041224 kubelet[2141]: E0702 00:49:16.041182 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:16.774596 kubelet[2141]: E0702 00:49:16.774512 2141 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.181:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.71?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="3.2s" Jul 2 00:49:17.042892 kubelet[2141]: E0702 00:49:17.042472 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 00:49:18.043889 kubelet[2141]: E0702 00:49:18.043824 2141 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"