Jul 2 01:52:15.038995 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 01:52:15.039013 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 01:52:15.039021 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Jul 2 01:52:15.039028 kernel: printk: bootconsole [pl11] enabled Jul 2 01:52:15.039033 kernel: efi: EFI v2.70 by EDK II Jul 2 01:52:15.039039 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Jul 2 01:52:15.039045 kernel: random: crng init done Jul 2 01:52:15.039051 kernel: ACPI: Early table checksum verification disabled Jul 2 01:52:15.039056 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Jul 2 01:52:15.039061 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039067 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039073 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Jul 2 01:52:15.039078 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039084 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039090 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039096 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039102 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039109 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039114 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Jul 2 01:52:15.039120 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:15.039126 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Jul 2 01:52:15.039131 kernel: NUMA: Failed to initialise from firmware Jul 2 01:52:15.039137 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:52:15.039143 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Jul 2 01:52:15.039148 kernel: Zone ranges: Jul 2 01:52:15.039154 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Jul 2 01:52:15.039159 kernel: DMA32 empty Jul 2 01:52:15.039166 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:52:15.039172 kernel: Movable zone start for each node Jul 2 01:52:15.039177 kernel: Early memory node ranges Jul 2 01:52:15.039183 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Jul 2 01:52:15.039189 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Jul 2 01:52:15.039194 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Jul 2 01:52:15.039200 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Jul 2 01:52:15.039205 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Jul 2 01:52:15.039211 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Jul 2 01:52:15.039217 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Jul 2 01:52:15.039222 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Jul 2 01:52:15.039228 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:52:15.039235 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:52:15.039243 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Jul 2 01:52:15.039249 kernel: psci: probing for conduit method from ACPI. Jul 2 01:52:15.039255 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 01:52:15.039261 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 01:52:15.039268 kernel: psci: MIGRATE_INFO_TYPE not supported. Jul 2 01:52:15.039274 kernel: psci: SMC Calling Convention v1.4 Jul 2 01:52:15.039280 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Jul 2 01:52:15.039286 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Jul 2 01:52:15.039292 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 01:52:15.039298 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 01:52:15.039304 kernel: pcpu-alloc: [0] 0 [0] 1 Jul 2 01:52:15.039310 kernel: Detected PIPT I-cache on CPU0 Jul 2 01:52:15.039316 kernel: CPU features: detected: GIC system register CPU interface Jul 2 01:52:15.039322 kernel: CPU features: detected: Hardware dirty bit management Jul 2 01:52:15.039328 kernel: CPU features: detected: Spectre-BHB Jul 2 01:52:15.039334 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 01:52:15.039342 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 01:52:15.039347 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 01:52:15.039353 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Jul 2 01:52:15.039359 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Jul 2 01:52:15.039365 kernel: Policy zone: Normal Jul 2 01:52:15.039373 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:52:15.039379 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 01:52:15.039385 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 01:52:15.039391 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 01:52:15.039397 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 01:52:15.039404 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Jul 2 01:52:15.039411 kernel: Memory: 3990264K/4194160K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 203896K reserved, 0K cma-reserved) Jul 2 01:52:15.039417 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 01:52:15.039423 kernel: trace event string verifier disabled Jul 2 01:52:15.039429 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 01:52:15.039435 kernel: rcu: RCU event tracing is enabled. Jul 2 01:52:15.039441 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 01:52:15.039448 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 01:52:15.039454 kernel: Tracing variant of Tasks RCU enabled. Jul 2 01:52:15.039460 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 01:52:15.039466 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 01:52:15.046944 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 01:52:15.046962 kernel: GICv3: 960 SPIs implemented Jul 2 01:52:15.046968 kernel: GICv3: 0 Extended SPIs implemented Jul 2 01:52:15.046975 kernel: GICv3: Distributor has no Range Selector support Jul 2 01:52:15.046981 kernel: Root IRQ handler: gic_handle_irq Jul 2 01:52:15.046987 kernel: GICv3: 16 PPIs implemented Jul 2 01:52:15.046994 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Jul 2 01:52:15.047000 kernel: ITS: No ITS available, not enabling LPIs Jul 2 01:52:15.047007 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:52:15.047013 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 01:52:15.047020 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 01:52:15.047026 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 01:52:15.047038 kernel: Console: colour dummy device 80x25 Jul 2 01:52:15.047045 kernel: printk: console [tty1] enabled Jul 2 01:52:15.047052 kernel: ACPI: Core revision 20210730 Jul 2 01:52:15.047059 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 01:52:15.047065 kernel: pid_max: default: 32768 minimum: 301 Jul 2 01:52:15.047071 kernel: LSM: Security Framework initializing Jul 2 01:52:15.047077 kernel: SELinux: Initializing. Jul 2 01:52:15.047084 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:52:15.047090 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:52:15.047098 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Jul 2 01:52:15.047105 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Jul 2 01:52:15.047111 kernel: rcu: Hierarchical SRCU implementation. Jul 2 01:52:15.047117 kernel: Remapping and enabling EFI services. Jul 2 01:52:15.047123 kernel: smp: Bringing up secondary CPUs ... Jul 2 01:52:15.047129 kernel: Detected PIPT I-cache on CPU1 Jul 2 01:52:15.047136 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Jul 2 01:52:15.047142 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:52:15.047149 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 01:52:15.047157 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 01:52:15.047163 kernel: SMP: Total of 2 processors activated. Jul 2 01:52:15.047170 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 01:52:15.047177 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Jul 2 01:52:15.047183 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 01:52:15.047190 kernel: CPU features: detected: CRC32 instructions Jul 2 01:52:15.047196 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 01:52:15.047202 kernel: CPU features: detected: LSE atomic instructions Jul 2 01:52:15.047209 kernel: CPU features: detected: Privileged Access Never Jul 2 01:52:15.047217 kernel: CPU: All CPU(s) started at EL1 Jul 2 01:52:15.047223 kernel: alternatives: patching kernel code Jul 2 01:52:15.047235 kernel: devtmpfs: initialized Jul 2 01:52:15.047243 kernel: KASLR enabled Jul 2 01:52:15.047249 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 01:52:15.047256 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 01:52:15.047263 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 01:52:15.047269 kernel: SMBIOS 3.1.0 present. Jul 2 01:52:15.047276 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Jul 2 01:52:15.047283 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 01:52:15.047291 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 01:52:15.047297 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 01:52:15.047304 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 01:52:15.047311 kernel: audit: initializing netlink subsys (disabled) Jul 2 01:52:15.047318 kernel: audit: type=2000 audit(0.094:1): state=initialized audit_enabled=0 res=1 Jul 2 01:52:15.047324 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 01:52:15.047331 kernel: cpuidle: using governor menu Jul 2 01:52:15.047339 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 01:52:15.047346 kernel: ASID allocator initialised with 32768 entries Jul 2 01:52:15.047352 kernel: ACPI: bus type PCI registered Jul 2 01:52:15.047359 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 01:52:15.047366 kernel: Serial: AMBA PL011 UART driver Jul 2 01:52:15.047372 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 01:52:15.047379 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 01:52:15.047386 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 01:52:15.047393 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 01:52:15.047401 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 01:52:15.047407 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 01:52:15.047414 kernel: ACPI: Added _OSI(Module Device) Jul 2 01:52:15.047421 kernel: ACPI: Added _OSI(Processor Device) Jul 2 01:52:15.047427 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 01:52:15.047434 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 01:52:15.047441 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 01:52:15.047448 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 01:52:15.047454 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 01:52:15.047463 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 01:52:15.047469 kernel: ACPI: Interpreter enabled Jul 2 01:52:15.047511 kernel: ACPI: Using GIC for interrupt routing Jul 2 01:52:15.047518 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Jul 2 01:52:15.047525 kernel: printk: console [ttyAMA0] enabled Jul 2 01:52:15.047531 kernel: printk: bootconsole [pl11] disabled Jul 2 01:52:15.047538 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Jul 2 01:52:15.047545 kernel: iommu: Default domain type: Translated Jul 2 01:52:15.047552 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 01:52:15.047560 kernel: vgaarb: loaded Jul 2 01:52:15.047567 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 01:52:15.047574 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 01:52:15.047580 kernel: PTP clock support registered Jul 2 01:52:15.047587 kernel: Registered efivars operations Jul 2 01:52:15.047594 kernel: No ACPI PMU IRQ for CPU0 Jul 2 01:52:15.047600 kernel: No ACPI PMU IRQ for CPU1 Jul 2 01:52:15.047607 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 01:52:15.047613 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 01:52:15.047622 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 01:52:15.047629 kernel: pnp: PnP ACPI init Jul 2 01:52:15.047636 kernel: pnp: PnP ACPI: found 0 devices Jul 2 01:52:15.047643 kernel: NET: Registered PF_INET protocol family Jul 2 01:52:15.047650 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 01:52:15.047656 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 01:52:15.047663 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 01:52:15.047670 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 01:52:15.047677 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 01:52:15.047685 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 01:52:15.047692 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:52:15.047699 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:52:15.047705 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 01:52:15.047712 kernel: PCI: CLS 0 bytes, default 64 Jul 2 01:52:15.047719 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Jul 2 01:52:15.047725 kernel: kvm [1]: HYP mode not available Jul 2 01:52:15.047732 kernel: Initialise system trusted keyrings Jul 2 01:52:15.047738 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 01:52:15.047746 kernel: Key type asymmetric registered Jul 2 01:52:15.047753 kernel: Asymmetric key parser 'x509' registered Jul 2 01:52:15.047759 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 01:52:15.047766 kernel: io scheduler mq-deadline registered Jul 2 01:52:15.047773 kernel: io scheduler kyber registered Jul 2 01:52:15.047779 kernel: io scheduler bfq registered Jul 2 01:52:15.047786 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 01:52:15.047793 kernel: thunder_xcv, ver 1.0 Jul 2 01:52:15.047799 kernel: thunder_bgx, ver 1.0 Jul 2 01:52:15.047807 kernel: nicpf, ver 1.0 Jul 2 01:52:15.047813 kernel: nicvf, ver 1.0 Jul 2 01:52:15.047949 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 01:52:15.048013 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T01:52:14 UTC (1719885134) Jul 2 01:52:15.048022 kernel: efifb: probing for efifb Jul 2 01:52:15.048029 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Jul 2 01:52:15.048035 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Jul 2 01:52:15.048042 kernel: efifb: scrolling: redraw Jul 2 01:52:15.048051 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 01:52:15.048058 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:52:15.048064 kernel: fb0: EFI VGA frame buffer device Jul 2 01:52:15.048072 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Jul 2 01:52:15.048078 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 01:52:15.048085 kernel: NET: Registered PF_INET6 protocol family Jul 2 01:52:15.048091 kernel: Segment Routing with IPv6 Jul 2 01:52:15.048098 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 01:52:15.048104 kernel: NET: Registered PF_PACKET protocol family Jul 2 01:52:15.048113 kernel: Key type dns_resolver registered Jul 2 01:52:15.048119 kernel: registered taskstats version 1 Jul 2 01:52:15.048126 kernel: Loading compiled-in X.509 certificates Jul 2 01:52:15.048133 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 01:52:15.048140 kernel: Key type .fscrypt registered Jul 2 01:52:15.048146 kernel: Key type fscrypt-provisioning registered Jul 2 01:52:15.048153 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 01:52:15.048160 kernel: ima: Allocated hash algorithm: sha1 Jul 2 01:52:15.048166 kernel: ima: No architecture policies found Jul 2 01:52:15.048174 kernel: clk: Disabling unused clocks Jul 2 01:52:15.048181 kernel: Freeing unused kernel memory: 36352K Jul 2 01:52:15.048187 kernel: Run /init as init process Jul 2 01:52:15.048194 kernel: with arguments: Jul 2 01:52:15.048200 kernel: /init Jul 2 01:52:15.048207 kernel: with environment: Jul 2 01:52:15.048213 kernel: HOME=/ Jul 2 01:52:15.048220 kernel: TERM=linux Jul 2 01:52:15.048226 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 01:52:15.048236 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:52:15.048246 systemd[1]: Detected virtualization microsoft. Jul 2 01:52:15.048253 systemd[1]: Detected architecture arm64. Jul 2 01:52:15.048260 systemd[1]: Running in initrd. Jul 2 01:52:15.048267 systemd[1]: No hostname configured, using default hostname. Jul 2 01:52:15.048274 systemd[1]: Hostname set to . Jul 2 01:52:15.048281 systemd[1]: Initializing machine ID from random generator. Jul 2 01:52:15.048290 systemd[1]: Queued start job for default target initrd.target. Jul 2 01:52:15.048297 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:52:15.048304 systemd[1]: Reached target cryptsetup.target. Jul 2 01:52:15.048311 systemd[1]: Reached target paths.target. Jul 2 01:52:15.048318 systemd[1]: Reached target slices.target. Jul 2 01:52:15.048325 systemd[1]: Reached target swap.target. Jul 2 01:52:15.048332 systemd[1]: Reached target timers.target. Jul 2 01:52:15.048339 systemd[1]: Listening on iscsid.socket. Jul 2 01:52:15.048348 systemd[1]: Listening on iscsiuio.socket. Jul 2 01:52:15.048355 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 01:52:15.048362 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 01:52:15.048369 systemd[1]: Listening on systemd-journald.socket. Jul 2 01:52:15.048376 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:52:15.048384 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:52:15.048390 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:52:15.048398 systemd[1]: Reached target sockets.target. Jul 2 01:52:15.048405 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:52:15.048413 systemd[1]: Finished network-cleanup.service. Jul 2 01:52:15.048420 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 01:52:15.048427 systemd[1]: Starting systemd-journald.service... Jul 2 01:52:15.048434 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:52:15.048441 systemd[1]: Starting systemd-resolved.service... Jul 2 01:52:15.048448 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 01:52:15.048459 systemd-journald[275]: Journal started Jul 2 01:52:15.048521 systemd-journald[275]: Runtime Journal (/run/log/journal/cc09993d18384e4ab2ca947e0a94699b) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:52:15.031515 systemd-modules-load[276]: Inserted module 'overlay' Jul 2 01:52:15.070740 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 01:52:15.076763 systemd-resolved[277]: Positive Trust Anchors: Jul 2 01:52:15.076786 systemd-resolved[277]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:52:15.076817 systemd-resolved[277]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:52:15.079006 systemd-resolved[277]: Defaulting to hostname 'linux'. Jul 2 01:52:15.149823 systemd[1]: Started systemd-journald.service. Jul 2 01:52:15.149851 kernel: audit: type=1130 audit(1719885135.130:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.151741 systemd[1]: Started systemd-resolved.service. Jul 2 01:52:15.169565 kernel: Bridge firewalling registered Jul 2 01:52:15.160743 systemd-modules-load[276]: Inserted module 'br_netfilter' Jul 2 01:52:15.204591 kernel: SCSI subsystem initialized Jul 2 01:52:15.204609 kernel: audit: type=1130 audit(1719885135.161:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.162279 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:52:15.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.182796 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 01:52:15.259407 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 01:52:15.259426 kernel: audit: type=1130 audit(1719885135.182:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.259435 kernel: device-mapper: uevent: version 1.0.3 Jul 2 01:52:15.225060 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 01:52:15.275354 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 01:52:15.249988 systemd[1]: Reached target nss-lookup.target. Jul 2 01:52:15.279764 kernel: audit: type=1130 audit(1719885135.224:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.280000 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 01:52:15.329343 kernel: audit: type=1130 audit(1719885135.249:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.280622 systemd-modules-load[276]: Inserted module 'dm_multipath' Jul 2 01:52:15.335413 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:52:15.341359 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:52:15.376086 kernel: audit: type=1130 audit(1719885135.354:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.354962 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 01:52:15.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.401690 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:52:15.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.432117 systemd[1]: Starting dracut-cmdline.service... Jul 2 01:52:15.444365 kernel: audit: type=1130 audit(1719885135.379:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.444395 kernel: audit: type=1130 audit(1719885135.409:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.443286 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:52:15.456644 dracut-cmdline[295]: dracut-dracut-053 Jul 2 01:52:15.459506 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:52:15.466071 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:52:15.520608 kernel: audit: type=1130 audit(1719885135.471:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.586501 kernel: Loading iSCSI transport class v2.0-870. Jul 2 01:52:15.599492 kernel: iscsi: registered transport (tcp) Jul 2 01:52:15.622004 kernel: iscsi: registered transport (qla4xxx) Jul 2 01:52:15.622076 kernel: QLogic iSCSI HBA Driver Jul 2 01:52:15.658699 systemd[1]: Finished dracut-cmdline.service. Jul 2 01:52:15.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:15.664893 systemd[1]: Starting dracut-pre-udev.service... Jul 2 01:52:15.715495 kernel: raid6: neonx8 gen() 13806 MB/s Jul 2 01:52:15.735514 kernel: raid6: neonx8 xor() 10827 MB/s Jul 2 01:52:15.755484 kernel: raid6: neonx4 gen() 13539 MB/s Jul 2 01:52:15.776484 kernel: raid6: neonx4 xor() 11310 MB/s Jul 2 01:52:15.796484 kernel: raid6: neonx2 gen() 13025 MB/s Jul 2 01:52:15.817484 kernel: raid6: neonx2 xor() 10479 MB/s Jul 2 01:52:15.837482 kernel: raid6: neonx1 gen() 10504 MB/s Jul 2 01:52:15.857484 kernel: raid6: neonx1 xor() 8770 MB/s Jul 2 01:52:15.878484 kernel: raid6: int64x8 gen() 6266 MB/s Jul 2 01:52:15.898483 kernel: raid6: int64x8 xor() 3536 MB/s Jul 2 01:52:15.918483 kernel: raid6: int64x4 gen() 7189 MB/s Jul 2 01:52:15.939483 kernel: raid6: int64x4 xor() 3856 MB/s Jul 2 01:52:15.959483 kernel: raid6: int64x2 gen() 6156 MB/s Jul 2 01:52:15.979483 kernel: raid6: int64x2 xor() 3322 MB/s Jul 2 01:52:16.000484 kernel: raid6: int64x1 gen() 5044 MB/s Jul 2 01:52:16.024814 kernel: raid6: int64x1 xor() 2648 MB/s Jul 2 01:52:16.024824 kernel: raid6: using algorithm neonx8 gen() 13806 MB/s Jul 2 01:52:16.024832 kernel: raid6: .... xor() 10827 MB/s, rmw enabled Jul 2 01:52:16.028812 kernel: raid6: using neon recovery algorithm Jul 2 01:52:16.049793 kernel: xor: measuring software checksum speed Jul 2 01:52:16.049815 kernel: 8regs : 17311 MB/sec Jul 2 01:52:16.054892 kernel: 32regs : 20765 MB/sec Jul 2 01:52:16.058766 kernel: arm64_neon : 27930 MB/sec Jul 2 01:52:16.058780 kernel: xor: using function: arm64_neon (27930 MB/sec) Jul 2 01:52:16.121495 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 01:52:16.133219 systemd[1]: Finished dracut-pre-udev.service. Jul 2 01:52:16.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:16.142000 audit: BPF prog-id=7 op=LOAD Jul 2 01:52:16.142000 audit: BPF prog-id=8 op=LOAD Jul 2 01:52:16.143033 systemd[1]: Starting systemd-udevd.service... Jul 2 01:52:16.163612 systemd-udevd[476]: Using default interface naming scheme 'v252'. Jul 2 01:52:16.169047 systemd[1]: Started systemd-udevd.service. Jul 2 01:52:16.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:16.181814 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 01:52:16.198497 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Jul 2 01:52:16.233269 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 01:52:16.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:16.239257 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:52:16.273157 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:52:16.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:16.340674 kernel: hv_vmbus: Vmbus version:5.3 Jul 2 01:52:16.355502 kernel: hv_vmbus: registering driver hyperv_keyboard Jul 2 01:52:16.374495 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Jul 2 01:52:16.374547 kernel: hv_vmbus: registering driver hid_hyperv Jul 2 01:52:16.374558 kernel: hv_vmbus: registering driver hv_storvsc Jul 2 01:52:16.382509 kernel: hv_vmbus: registering driver hv_netvsc Jul 2 01:52:16.391073 kernel: scsi host0: storvsc_host_t Jul 2 01:52:16.391273 kernel: scsi host1: storvsc_host_t Jul 2 01:52:16.391296 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Jul 2 01:52:16.406012 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Jul 2 01:52:16.406076 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Jul 2 01:52:16.418502 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Jul 2 01:52:16.437684 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Jul 2 01:52:16.437954 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 01:52:16.453905 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Jul 2 01:52:16.454118 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 01:52:16.458171 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 01:52:16.458485 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Jul 2 01:52:16.458617 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Jul 2 01:52:16.465505 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Jul 2 01:52:16.474835 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:16.474895 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 01:52:16.518498 kernel: hv_netvsc 002248c1-6a3d-0022-48c1-6a3d002248c1 eth0: VF slot 1 added Jul 2 01:52:16.527501 kernel: hv_vmbus: registering driver hv_pci Jul 2 01:52:16.538058 kernel: hv_pci 27ef5a29-31e1-4b2d-8483-d51647111b39: PCI VMBus probing: Using version 0x10004 Jul 2 01:52:16.538326 kernel: hv_pci 27ef5a29-31e1-4b2d-8483-d51647111b39: PCI host bridge to bus 31e1:00 Jul 2 01:52:16.550122 kernel: pci_bus 31e1:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Jul 2 01:52:16.550252 kernel: pci_bus 31e1:00: No busn resource found for root bus, will use [bus 00-ff] Jul 2 01:52:16.567785 kernel: pci 31e1:00:02.0: [15b3:1018] type 00 class 0x020000 Jul 2 01:52:16.580507 kernel: pci 31e1:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:52:16.602509 kernel: pci 31e1:00:02.0: enabling Extended Tags Jul 2 01:52:16.627899 kernel: pci 31e1:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 31e1:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Jul 2 01:52:16.628035 kernel: pci_bus 31e1:00: busn_res: [bus 00-ff] end is updated to 00 Jul 2 01:52:16.628114 kernel: pci 31e1:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:52:16.676495 kernel: mlx5_core 31e1:00:02.0: firmware version: 16.30.1284 Jul 2 01:52:16.838596 kernel: mlx5_core 31e1:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Jul 2 01:52:16.887379 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 01:52:16.921290 kernel: hv_netvsc 002248c1-6a3d-0022-48c1-6a3d002248c1 eth0: VF registering: eth1 Jul 2 01:52:16.921609 kernel: mlx5_core 31e1:00:02.0 eth1: joined to eth0 Jul 2 01:52:16.934516 kernel: mlx5_core 31e1:00:02.0 enP12769s1: renamed from eth1 Jul 2 01:52:16.944502 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (528) Jul 2 01:52:16.960698 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:52:17.116284 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 01:52:17.133295 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 01:52:17.138940 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 01:52:17.151541 systemd[1]: Starting disk-uuid.service... Jul 2 01:52:17.177506 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:17.186493 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:18.193497 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:18.194712 disk-uuid[605]: The operation has completed successfully. Jul 2 01:52:18.268505 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 01:52:18.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.268598 systemd[1]: Finished disk-uuid.service. Jul 2 01:52:18.273495 systemd[1]: Starting verity-setup.service... Jul 2 01:52:18.318078 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 01:52:18.491076 systemd[1]: Found device dev-mapper-usr.device. Jul 2 01:52:18.497227 systemd[1]: Mounting sysusr-usr.mount... Jul 2 01:52:18.511224 systemd[1]: Finished verity-setup.service. Jul 2 01:52:18.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.565494 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 01:52:18.566095 systemd[1]: Mounted sysusr-usr.mount. Jul 2 01:52:18.573545 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 01:52:18.574380 systemd[1]: Starting ignition-setup.service... Jul 2 01:52:18.608467 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:52:18.608499 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:52:18.586250 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 01:52:18.619223 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:52:18.671934 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 01:52:18.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.680000 audit: BPF prog-id=9 op=LOAD Jul 2 01:52:18.681754 systemd[1]: Starting systemd-networkd.service... Jul 2 01:52:18.693909 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 01:52:18.708628 systemd-networkd[846]: lo: Link UP Jul 2 01:52:18.708641 systemd-networkd[846]: lo: Gained carrier Jul 2 01:52:18.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.709085 systemd-networkd[846]: Enumeration completed Jul 2 01:52:18.712895 systemd[1]: Started systemd-networkd.service. Jul 2 01:52:18.713213 systemd-networkd[846]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:52:18.722037 systemd[1]: Reached target network.target. Jul 2 01:52:18.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.730193 systemd[1]: Starting iscsiuio.service... Jul 2 01:52:18.741193 systemd[1]: Started iscsiuio.service. Jul 2 01:52:18.753436 systemd[1]: Starting iscsid.service... Jul 2 01:52:18.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.785376 iscsid[855]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:52:18.785376 iscsid[855]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 01:52:18.785376 iscsid[855]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 01:52:18.785376 iscsid[855]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 01:52:18.785376 iscsid[855]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 01:52:18.785376 iscsid[855]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:52:18.785376 iscsid[855]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 01:52:18.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.772411 systemd[1]: Started iscsid.service. Jul 2 01:52:18.781368 systemd[1]: Starting dracut-initqueue.service... Jul 2 01:52:18.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.793262 systemd[1]: Finished dracut-initqueue.service. Jul 2 01:52:18.798429 systemd[1]: Reached target remote-fs-pre.target. Jul 2 01:52:18.824191 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:52:18.930816 kernel: mlx5_core 31e1:00:02.0 enP12769s1: Link up Jul 2 01:52:18.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:18.843614 systemd[1]: Reached target remote-fs.target. Jul 2 01:52:18.862232 systemd[1]: Starting dracut-pre-mount.service... Jul 2 01:52:18.888323 systemd[1]: Finished dracut-pre-mount.service. Jul 2 01:52:18.908846 systemd[1]: Finished ignition-setup.service. Jul 2 01:52:18.921225 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 01:52:18.970099 kernel: hv_netvsc 002248c1-6a3d-0022-48c1-6a3d002248c1 eth0: Data path switched to VF: enP12769s1 Jul 2 01:52:18.970278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:18.970503 systemd-networkd[846]: enP12769s1: Link UP Jul 2 01:52:18.970716 systemd-networkd[846]: eth0: Link UP Jul 2 01:52:18.971103 systemd-networkd[846]: eth0: Gained carrier Jul 2 01:52:18.982971 systemd-networkd[846]: enP12769s1: Gained carrier Jul 2 01:52:18.998573 systemd-networkd[846]: eth0: DHCPv4 address 10.200.20.45/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:52:20.169647 systemd-networkd[846]: eth0: Gained IPv6LL Jul 2 01:52:21.358566 ignition[870]: Ignition 2.14.0 Jul 2 01:52:21.358579 ignition[870]: Stage: fetch-offline Jul 2 01:52:21.358649 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:21.358677 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:21.409152 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:21.409343 ignition[870]: parsed url from cmdline: "" Jul 2 01:52:21.416824 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 01:52:21.455002 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 2 01:52:21.455028 kernel: audit: type=1130 audit(1719885141.422:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.409346 ignition[870]: no config URL provided Jul 2 01:52:21.424236 systemd[1]: Starting ignition-fetch.service... Jul 2 01:52:21.409352 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:52:21.409363 ignition[870]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:52:21.409369 ignition[870]: failed to fetch config: resource requires networking Jul 2 01:52:21.409644 ignition[870]: Ignition finished successfully Jul 2 01:52:21.435043 ignition[876]: Ignition 2.14.0 Jul 2 01:52:21.435050 ignition[876]: Stage: fetch Jul 2 01:52:21.435177 ignition[876]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:21.435196 ignition[876]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:21.438101 ignition[876]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:21.438230 ignition[876]: parsed url from cmdline: "" Jul 2 01:52:21.438233 ignition[876]: no config URL provided Jul 2 01:52:21.438238 ignition[876]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:52:21.438245 ignition[876]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:52:21.438276 ignition[876]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Jul 2 01:52:21.551104 ignition[876]: GET result: OK Jul 2 01:52:21.553445 unknown[876]: fetched base config from "system" Jul 2 01:52:21.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.551163 ignition[876]: config has been read from IMDS userdata Jul 2 01:52:21.588284 kernel: audit: type=1130 audit(1719885141.561:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.553454 unknown[876]: fetched base config from "system" Jul 2 01:52:21.551180 ignition[876]: parsing config with SHA512: 162a687353970e56ef7a68c9d922c6dfaf5e90a5586e9b696c0184fa288723db889ba7f796fd69c6bb0d70c0746cb104c5c2656f4c2fe2e546b22f5da4e03a2f Jul 2 01:52:21.553463 unknown[876]: fetched user config from "azure" Jul 2 01:52:21.553830 ignition[876]: fetch: fetch complete Jul 2 01:52:21.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.555061 systemd[1]: Finished ignition-fetch.service. Jul 2 01:52:21.637539 kernel: audit: type=1130 audit(1719885141.608:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.553835 ignition[876]: fetch: fetch passed Jul 2 01:52:21.583612 systemd[1]: Starting ignition-kargs.service... Jul 2 01:52:21.670573 kernel: audit: type=1130 audit(1719885141.651:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.553883 ignition[876]: Ignition finished successfully Jul 2 01:52:21.603605 systemd[1]: Finished ignition-kargs.service. Jul 2 01:52:21.596439 ignition[882]: Ignition 2.14.0 Jul 2 01:52:21.629678 systemd[1]: Starting ignition-disks.service... Jul 2 01:52:21.596446 ignition[882]: Stage: kargs Jul 2 01:52:21.647177 systemd[1]: Finished ignition-disks.service. Jul 2 01:52:21.596594 ignition[882]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:21.652321 systemd[1]: Reached target initrd-root-device.target. Jul 2 01:52:21.596621 ignition[882]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:21.675357 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:52:21.600503 ignition[882]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:21.683209 systemd[1]: Reached target local-fs.target. Jul 2 01:52:21.602372 ignition[882]: kargs: kargs passed Jul 2 01:52:21.690830 systemd[1]: Reached target sysinit.target. Jul 2 01:52:21.602439 ignition[882]: Ignition finished successfully Jul 2 01:52:21.697577 systemd[1]: Reached target basic.target. Jul 2 01:52:21.636932 ignition[888]: Ignition 2.14.0 Jul 2 01:52:21.707226 systemd[1]: Starting systemd-fsck-root.service... Jul 2 01:52:21.636939 ignition[888]: Stage: disks Jul 2 01:52:21.637067 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:21.637086 ignition[888]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:21.642249 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:21.643655 ignition[888]: disks: disks passed Jul 2 01:52:21.643733 ignition[888]: Ignition finished successfully Jul 2 01:52:21.815717 systemd-fsck[896]: ROOT: clean, 614/7326000 files, 481075/7359488 blocks Jul 2 01:52:21.825867 systemd[1]: Finished systemd-fsck-root.service. Jul 2 01:52:21.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.860023 systemd[1]: Mounting sysroot.mount... Jul 2 01:52:21.870673 kernel: audit: type=1130 audit(1719885141.832:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.883314 systemd[1]: Mounted sysroot.mount. Jul 2 01:52:21.890406 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 01:52:21.887120 systemd[1]: Reached target initrd-root-fs.target. Jul 2 01:52:21.924455 systemd[1]: Mounting sysroot-usr.mount... Jul 2 01:52:21.929389 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 01:52:21.936962 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 01:52:21.937016 systemd[1]: Reached target ignition-diskful.target. Jul 2 01:52:21.948847 systemd[1]: Mounted sysroot-usr.mount. Jul 2 01:52:22.010844 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:52:22.015893 systemd[1]: Starting initrd-setup-root.service... Jul 2 01:52:22.040555 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (906) Jul 2 01:52:22.048510 initrd-setup-root[911]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 01:52:22.065321 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:52:22.065343 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:52:22.065352 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:52:22.070342 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:52:22.093324 initrd-setup-root[937]: cut: /sysroot/etc/group: No such file or directory Jul 2 01:52:22.117986 initrd-setup-root[945]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 01:52:22.126893 initrd-setup-root[953]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 01:52:22.670925 systemd[1]: Finished initrd-setup-root.service. Jul 2 01:52:22.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:22.694622 systemd[1]: Starting ignition-mount.service... Jul 2 01:52:22.704249 kernel: audit: type=1130 audit(1719885142.675:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:22.705180 systemd[1]: Starting sysroot-boot.service... Jul 2 01:52:22.709868 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 01:52:22.710020 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 01:52:22.737547 ignition[973]: INFO : Ignition 2.14.0 Jul 2 01:52:22.737547 ignition[973]: INFO : Stage: mount Jul 2 01:52:22.746194 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:22.746194 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:22.746194 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:22.746194 ignition[973]: INFO : mount: mount passed Jul 2 01:52:22.746194 ignition[973]: INFO : Ignition finished successfully Jul 2 01:52:22.824097 kernel: audit: type=1130 audit(1719885142.770:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:22.824121 kernel: audit: type=1130 audit(1719885142.799:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:22.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:22.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:22.746214 systemd[1]: Finished ignition-mount.service. Jul 2 01:52:22.772602 systemd[1]: Finished sysroot-boot.service. Jul 2 01:52:23.228209 coreos-metadata[905]: Jul 02 01:52:23.228 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 01:52:23.237765 coreos-metadata[905]: Jul 02 01:52:23.237 INFO Fetch successful Jul 2 01:52:23.272574 coreos-metadata[905]: Jul 02 01:52:23.272 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Jul 2 01:52:23.286485 coreos-metadata[905]: Jul 02 01:52:23.286 INFO Fetch successful Jul 2 01:52:23.302283 coreos-metadata[905]: Jul 02 01:52:23.302 INFO wrote hostname ci-3510.3.5-a-bbfd170fa1 to /sysroot/etc/hostname Jul 2 01:52:23.311074 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 01:52:23.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.337913 systemd[1]: Starting ignition-files.service... Jul 2 01:52:23.346681 kernel: audit: type=1130 audit(1719885143.315:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.347704 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:52:23.363492 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (984) Jul 2 01:52:23.375591 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:52:23.375606 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:52:23.375615 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:52:23.386369 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:52:23.403586 ignition[1003]: INFO : Ignition 2.14.0 Jul 2 01:52:23.407724 ignition[1003]: INFO : Stage: files Jul 2 01:52:23.407724 ignition[1003]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:23.407724 ignition[1003]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:23.431142 ignition[1003]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:23.431142 ignition[1003]: DEBUG : files: compiled without relabeling support, skipping Jul 2 01:52:23.431142 ignition[1003]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 01:52:23.431142 ignition[1003]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 01:52:23.477731 ignition[1003]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem165181773" Jul 2 01:52:23.497004 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem165181773": device or resource busy Jul 2 01:52:23.497004 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem165181773", trying btrfs: device or resource busy Jul 2 01:52:23.497004 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem165181773" Jul 2 01:52:23.650155 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1003) Jul 2 01:52:23.478343 unknown[1003]: wrote ssh authorized keys file for user: core Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem165181773" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem165181773" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem165181773" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2227645451" Jul 2 01:52:23.655410 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2227645451": device or resource busy Jul 2 01:52:23.655410 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2227645451", trying btrfs: device or resource busy Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2227645451" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2227645451" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2227645451" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2227645451" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:52:23.655410 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 01:52:23.507667 systemd[1]: mnt-oem165181773.mount: Deactivated successfully. Jul 2 01:52:23.814141 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Jul 2 01:52:23.529168 systemd[1]: mnt-oem2227645451.mount: Deactivated successfully. Jul 2 01:52:23.975138 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Jul 2 01:52:24.216792 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 01:52:24.216792 ignition[1003]: INFO : files: op(f): [started] processing unit "waagent.service" Jul 2 01:52:24.216792 ignition[1003]: INFO : files: op(f): [finished] processing unit "waagent.service" Jul 2 01:52:24.216792 ignition[1003]: INFO : files: op(10): [started] processing unit "nvidia.service" Jul 2 01:52:24.216792 ignition[1003]: INFO : files: op(10): [finished] processing unit "nvidia.service" Jul 2 01:52:24.216792 ignition[1003]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Jul 2 01:52:24.298078 kernel: audit: type=1130 audit(1719885144.239:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.298225 ignition[1003]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Jul 2 01:52:24.298225 ignition[1003]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Jul 2 01:52:24.298225 ignition[1003]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Jul 2 01:52:24.298225 ignition[1003]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:52:24.298225 ignition[1003]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:52:24.298225 ignition[1003]: INFO : files: files passed Jul 2 01:52:24.298225 ignition[1003]: INFO : Ignition finished successfully Jul 2 01:52:24.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.230065 systemd[1]: Finished ignition-files.service. Jul 2 01:52:24.263127 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 01:52:24.389162 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 01:52:24.268135 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 01:52:24.269513 systemd[1]: Starting ignition-quench.service... Jul 2 01:52:24.285672 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 01:52:24.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.285769 systemd[1]: Finished ignition-quench.service. Jul 2 01:52:24.298197 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 01:52:24.303852 systemd[1]: Reached target ignition-complete.target. Jul 2 01:52:24.316443 systemd[1]: Starting initrd-parse-etc.service... Jul 2 01:52:24.339036 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 01:52:24.339151 systemd[1]: Finished initrd-parse-etc.service. Jul 2 01:52:24.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.349602 systemd[1]: Reached target initrd-fs.target. Jul 2 01:52:24.362885 systemd[1]: Reached target initrd.target. Jul 2 01:52:24.370953 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 01:52:24.371942 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 01:52:24.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.415031 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 01:52:24.422024 systemd[1]: Starting initrd-cleanup.service... Jul 2 01:52:24.448368 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 01:52:24.448466 systemd[1]: Finished initrd-cleanup.service. Jul 2 01:52:24.457877 systemd[1]: Stopped target nss-lookup.target. Jul 2 01:52:24.465740 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 01:52:24.474476 systemd[1]: Stopped target timers.target. Jul 2 01:52:24.482085 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 01:52:24.482155 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 01:52:24.493051 systemd[1]: Stopped target initrd.target. Jul 2 01:52:24.501518 systemd[1]: Stopped target basic.target. Jul 2 01:52:24.509428 systemd[1]: Stopped target ignition-complete.target. Jul 2 01:52:24.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.518364 systemd[1]: Stopped target ignition-diskful.target. Jul 2 01:52:24.527624 systemd[1]: Stopped target initrd-root-device.target. Jul 2 01:52:24.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.536209 systemd[1]: Stopped target remote-fs.target. Jul 2 01:52:24.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.544162 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 01:52:24.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.553034 systemd[1]: Stopped target sysinit.target. Jul 2 01:52:24.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.560606 systemd[1]: Stopped target local-fs.target. Jul 2 01:52:24.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.570026 systemd[1]: Stopped target local-fs-pre.target. Jul 2 01:52:24.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.577932 systemd[1]: Stopped target swap.target. Jul 2 01:52:24.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.683726 ignition[1042]: INFO : Ignition 2.14.0 Jul 2 01:52:24.683726 ignition[1042]: INFO : Stage: umount Jul 2 01:52:24.683726 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:24.683726 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:24.683726 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:24.683726 ignition[1042]: INFO : umount: umount passed Jul 2 01:52:24.683726 ignition[1042]: INFO : Ignition finished successfully Jul 2 01:52:24.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.585923 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 01:52:24.585991 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 01:52:24.593771 systemd[1]: Stopped target cryptsetup.target. Jul 2 01:52:24.603075 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 01:52:24.603129 systemd[1]: Stopped dracut-initqueue.service. Jul 2 01:52:24.611604 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 01:52:24.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.611645 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 01:52:24.621047 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 01:52:24.621089 systemd[1]: Stopped ignition-files.service. Jul 2 01:52:24.628827 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 01:52:24.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.628870 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 01:52:24.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.864000 audit: BPF prog-id=6 op=UNLOAD Jul 2 01:52:24.638236 systemd[1]: Stopping ignition-mount.service... Jul 2 01:52:24.645315 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 01:52:24.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.645383 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 01:52:24.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.651463 systemd[1]: Stopping sysroot-boot.service... Jul 2 01:52:24.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.662498 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 01:52:24.662584 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 01:52:24.667199 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 01:52:24.667253 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 01:52:24.683767 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 01:52:24.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.683875 systemd[1]: Stopped ignition-mount.service. Jul 2 01:52:24.688308 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 01:52:24.688358 systemd[1]: Stopped ignition-disks.service. Jul 2 01:52:24.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.692698 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 01:52:24.993768 kernel: hv_netvsc 002248c1-6a3d-0022-48c1-6a3d002248c1 eth0: Data path switched from VF: enP12769s1 Jul 2 01:52:24.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.692738 systemd[1]: Stopped ignition-kargs.service. Jul 2 01:52:24.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.701793 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 01:52:24.701840 systemd[1]: Stopped ignition-fetch.service. Jul 2 01:52:24.712335 systemd[1]: Stopped target network.target. Jul 2 01:52:25.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.724981 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 01:52:25.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:25.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.725065 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 01:52:24.745495 systemd[1]: Stopped target paths.target. Jul 2 01:52:24.757088 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 01:52:24.765004 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 01:52:24.772748 systemd[1]: Stopped target slices.target. Jul 2 01:52:24.782767 systemd[1]: Stopped target sockets.target. Jul 2 01:52:24.790951 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 01:52:24.790988 systemd[1]: Closed iscsid.socket. Jul 2 01:52:24.798192 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 01:52:24.798213 systemd[1]: Closed iscsiuio.socket. Jul 2 01:52:24.810866 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 01:52:24.810923 systemd[1]: Stopped ignition-setup.service. Jul 2 01:52:24.818923 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:52:24.828365 systemd[1]: Stopping systemd-resolved.service... Jul 2 01:52:24.833522 systemd-networkd[846]: eth0: DHCPv6 lease lost Jul 2 01:52:25.100000 audit: BPF prog-id=9 op=UNLOAD Jul 2 01:52:24.844738 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 01:52:25.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.845280 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 01:52:24.845386 systemd[1]: Stopped systemd-resolved.service. Jul 2 01:52:24.854150 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:52:24.854255 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:52:24.865508 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 01:52:24.865550 systemd[1]: Closed systemd-networkd.socket. Jul 2 01:52:24.874421 systemd[1]: Stopping network-cleanup.service... Jul 2 01:52:24.882880 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 01:52:24.882956 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 01:52:24.887832 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 01:52:24.887892 systemd[1]: Stopped systemd-sysctl.service. Jul 2 01:52:24.902886 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 01:52:24.902942 systemd[1]: Stopped systemd-modules-load.service. Jul 2 01:52:24.915576 systemd[1]: Stopping systemd-udevd.service... Jul 2 01:52:24.925690 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 01:52:24.935585 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 01:52:24.935740 systemd[1]: Stopped systemd-udevd.service. Jul 2 01:52:24.944336 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 01:52:24.944387 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 01:52:25.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.953105 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 01:52:24.953147 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 01:52:25.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:24.963232 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 01:52:24.963287 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 01:52:24.981290 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 01:52:24.981346 systemd[1]: Stopped dracut-cmdline.service. Jul 2 01:52:24.989076 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 01:52:24.989123 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 01:52:25.001830 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 01:52:25.014001 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 01:52:25.014089 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 01:52:25.024449 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 01:52:25.024574 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 01:52:25.291902 iscsid[855]: iscsid shutting down. Jul 2 01:52:25.101961 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 01:52:25.102075 systemd[1]: Stopped network-cleanup.service. Jul 2 01:52:25.200894 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 01:52:25.201012 systemd[1]: Stopped sysroot-boot.service. Jul 2 01:52:25.208151 systemd[1]: Reached target initrd-switch-root.target. Jul 2 01:52:25.216894 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 01:52:25.216964 systemd[1]: Stopped initrd-setup-root.service. Jul 2 01:52:25.227054 systemd[1]: Starting initrd-switch-root.service... Jul 2 01:52:25.242246 systemd[1]: Switching root. Jul 2 01:52:25.292200 systemd-journald[275]: Journal stopped Jul 2 01:52:37.520113 systemd-journald[275]: Received SIGTERM from PID 1 (n/a). Jul 2 01:52:37.520135 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 01:52:37.520148 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 01:52:37.520157 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 01:52:37.520165 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 01:52:37.520172 kernel: SELinux: policy capability open_perms=1 Jul 2 01:52:37.520181 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 01:52:37.520189 kernel: SELinux: policy capability always_check_network=0 Jul 2 01:52:37.520197 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 01:52:37.520206 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 01:52:37.520214 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 01:52:37.520222 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 01:52:37.520230 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 2 01:52:37.520239 kernel: audit: type=1403 audit(1719885147.459:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:52:37.520248 systemd[1]: Successfully loaded SELinux policy in 269.365ms. Jul 2 01:52:37.520260 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.015ms. Jul 2 01:52:37.520270 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:52:37.520281 systemd[1]: Detected virtualization microsoft. Jul 2 01:52:37.520290 systemd[1]: Detected architecture arm64. Jul 2 01:52:37.520298 systemd[1]: Detected first boot. Jul 2 01:52:37.520308 systemd[1]: Hostname set to . Jul 2 01:52:37.520318 systemd[1]: Initializing machine ID from random generator. Jul 2 01:52:37.520327 kernel: audit: type=1400 audit(1719885148.219:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:37.520337 kernel: audit: type=1400 audit(1719885148.219:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:37.520345 kernel: audit: type=1334 audit(1719885148.238:82): prog-id=10 op=LOAD Jul 2 01:52:37.520353 kernel: audit: type=1334 audit(1719885148.238:83): prog-id=10 op=UNLOAD Jul 2 01:52:37.520362 kernel: audit: type=1334 audit(1719885148.256:84): prog-id=11 op=LOAD Jul 2 01:52:37.520370 kernel: audit: type=1334 audit(1719885148.256:85): prog-id=11 op=UNLOAD Jul 2 01:52:37.520380 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 01:52:37.520389 kernel: audit: type=1400 audit(1719885149.672:86): avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:52:37.520399 kernel: audit: type=1300 audit(1719885149.672:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:37.520408 kernel: audit: type=1327 audit(1719885149.672:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:52:37.520417 systemd[1]: Populated /etc with preset unit settings. Jul 2 01:52:37.520426 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:52:37.520436 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:52:37.520448 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:52:37.520457 kernel: kauditd_printk_skb: 6 callbacks suppressed Jul 2 01:52:37.520465 kernel: audit: type=1334 audit(1719885156.744:88): prog-id=12 op=LOAD Jul 2 01:52:37.520488 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 01:52:37.520517 kernel: audit: type=1334 audit(1719885156.744:89): prog-id=3 op=UNLOAD Jul 2 01:52:37.520529 kernel: audit: type=1334 audit(1719885156.744:90): prog-id=13 op=LOAD Jul 2 01:52:37.520538 kernel: audit: type=1334 audit(1719885156.744:91): prog-id=14 op=LOAD Jul 2 01:52:37.520547 systemd[1]: Stopped iscsiuio.service. Jul 2 01:52:37.520557 kernel: audit: type=1334 audit(1719885156.744:92): prog-id=4 op=UNLOAD Jul 2 01:52:37.520566 kernel: audit: type=1334 audit(1719885156.744:93): prog-id=5 op=UNLOAD Jul 2 01:52:37.520576 kernel: audit: type=1131 audit(1719885156.745:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.520585 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 01:52:37.520594 kernel: audit: type=1334 audit(1719885156.767:95): prog-id=12 op=UNLOAD Jul 2 01:52:37.520603 systemd[1]: Stopped iscsid.service. Jul 2 01:52:37.520613 kernel: audit: type=1131 audit(1719885156.814:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.520623 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 01:52:37.520632 kernel: audit: type=1131 audit(1719885156.852:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.520641 systemd[1]: Stopped initrd-switch-root.service. Jul 2 01:52:37.520651 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 01:52:37.520660 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 01:52:37.520669 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 01:52:37.520679 systemd[1]: Created slice system-getty.slice. Jul 2 01:52:37.520688 systemd[1]: Created slice system-modprobe.slice. Jul 2 01:52:37.520699 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 01:52:37.520710 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 01:52:37.520720 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 01:52:37.520729 systemd[1]: Created slice user.slice. Jul 2 01:52:37.520738 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:52:37.520748 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 01:52:37.520757 systemd[1]: Set up automount boot.automount. Jul 2 01:52:37.520766 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 01:52:37.520777 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 01:52:37.520786 systemd[1]: Stopped target initrd-fs.target. Jul 2 01:52:37.520795 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 01:52:37.520805 systemd[1]: Reached target integritysetup.target. Jul 2 01:52:37.520814 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:52:37.520823 systemd[1]: Reached target remote-fs.target. Jul 2 01:52:37.520832 systemd[1]: Reached target slices.target. Jul 2 01:52:37.520841 systemd[1]: Reached target swap.target. Jul 2 01:52:37.520851 systemd[1]: Reached target torcx.target. Jul 2 01:52:37.520861 systemd[1]: Reached target veritysetup.target. Jul 2 01:52:37.520870 systemd[1]: Listening on systemd-coredump.socket. Jul 2 01:52:37.520880 systemd[1]: Listening on systemd-initctl.socket. Jul 2 01:52:37.520893 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:52:37.520903 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:52:37.520914 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:52:37.520924 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 01:52:37.520933 systemd[1]: Mounting dev-hugepages.mount... Jul 2 01:52:37.520943 systemd[1]: Mounting dev-mqueue.mount... Jul 2 01:52:37.520953 systemd[1]: Mounting media.mount... Jul 2 01:52:37.520962 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 01:52:37.520972 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 01:52:37.520981 systemd[1]: Mounting tmp.mount... Jul 2 01:52:37.520991 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 01:52:37.521001 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:37.521010 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:52:37.521019 systemd[1]: Starting modprobe@configfs.service... Jul 2 01:52:37.521029 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:37.521038 systemd[1]: Starting modprobe@drm.service... Jul 2 01:52:37.521048 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:37.521057 systemd[1]: Starting modprobe@fuse.service... Jul 2 01:52:37.521066 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:37.521078 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 01:52:37.521087 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 01:52:37.521096 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 01:52:37.521106 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 01:52:37.521117 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 01:52:37.521126 systemd[1]: Stopped systemd-journald.service. Jul 2 01:52:37.521136 systemd[1]: systemd-journald.service: Consumed 2.867s CPU time. Jul 2 01:52:37.521145 kernel: loop: module loaded Jul 2 01:52:37.521154 systemd[1]: Starting systemd-journald.service... Jul 2 01:52:37.521165 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:52:37.521174 systemd[1]: Starting systemd-network-generator.service... Jul 2 01:52:37.521183 kernel: fuse: init (API version 7.34) Jul 2 01:52:37.521192 systemd[1]: Starting systemd-remount-fs.service... Jul 2 01:52:37.521202 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:52:37.521211 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 01:52:37.521221 systemd[1]: Stopped verity-setup.service. Jul 2 01:52:37.521231 systemd[1]: Mounted dev-hugepages.mount. Jul 2 01:52:37.521240 systemd[1]: Mounted dev-mqueue.mount. Jul 2 01:52:37.521255 systemd-journald[1153]: Journal started Jul 2 01:52:37.521293 systemd-journald[1153]: Runtime Journal (/run/log/journal/4f4bf836226f48fdb18d7e79859cb5b7) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:52:27.459000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:52:28.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:28.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:28.238000 audit: BPF prog-id=10 op=LOAD Jul 2 01:52:28.238000 audit: BPF prog-id=10 op=UNLOAD Jul 2 01:52:28.256000 audit: BPF prog-id=11 op=LOAD Jul 2 01:52:28.256000 audit: BPF prog-id=11 op=UNLOAD Jul 2 01:52:29.672000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:52:29.672000 audit[1075]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.672000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:52:29.692000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 01:52:29.692000 audit[1075]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022109 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.692000 audit: CWD cwd="/" Jul 2 01:52:29.692000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:29.692000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:29.692000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:52:36.744000 audit: BPF prog-id=12 op=LOAD Jul 2 01:52:36.744000 audit: BPF prog-id=3 op=UNLOAD Jul 2 01:52:36.744000 audit: BPF prog-id=13 op=LOAD Jul 2 01:52:36.744000 audit: BPF prog-id=14 op=LOAD Jul 2 01:52:36.744000 audit: BPF prog-id=4 op=UNLOAD Jul 2 01:52:36.744000 audit: BPF prog-id=5 op=UNLOAD Jul 2 01:52:36.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:36.767000 audit: BPF prog-id=12 op=UNLOAD Jul 2 01:52:36.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:36.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:36.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:36.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.389000 audit: BPF prog-id=15 op=LOAD Jul 2 01:52:37.389000 audit: BPF prog-id=16 op=LOAD Jul 2 01:52:37.389000 audit: BPF prog-id=17 op=LOAD Jul 2 01:52:37.389000 audit: BPF prog-id=13 op=UNLOAD Jul 2 01:52:37.389000 audit: BPF prog-id=14 op=UNLOAD Jul 2 01:52:37.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.517000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 01:52:37.517000 audit[1153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffda1e5a0 a2=4000 a3=1 items=0 ppid=1 pid=1153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:37.517000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 01:52:36.742657 systemd[1]: Queued start job for default target multi-user.target. Jul 2 01:52:29.607327 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:52:36.746001 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 01:52:29.621344 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:52:36.746395 systemd[1]: systemd-journald.service: Consumed 2.867s CPU time. Jul 2 01:52:29.621363 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:52:29.621404 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 01:52:29.621415 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 01:52:29.621450 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 01:52:29.621463 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 01:52:29.621695 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 01:52:29.621729 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:52:29.621741 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:52:29.657033 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 01:52:29.657097 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 01:52:29.657122 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 01:52:29.657137 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 01:52:29.657168 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 01:52:29.657182 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 01:52:35.543106 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:35.543366 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:35.543500 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:35.543668 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:35.543718 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 01:52:35.543774 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-07-02T01:52:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 01:52:37.533921 systemd[1]: Started systemd-journald.service. Jul 2 01:52:37.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.531115 systemd[1]: Mounted media.mount. Jul 2 01:52:37.534860 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 01:52:37.539338 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 01:52:37.543756 systemd[1]: Mounted tmp.mount. Jul 2 01:52:37.547286 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 01:52:37.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.552126 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:52:37.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.557291 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 01:52:37.557426 systemd[1]: Finished modprobe@configfs.service. Jul 2 01:52:37.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.562535 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:37.562661 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:37.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.567767 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:52:37.567889 systemd[1]: Finished modprobe@drm.service. Jul 2 01:52:37.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.572766 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:37.572894 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:37.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.577997 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 01:52:37.578121 systemd[1]: Finished modprobe@fuse.service. Jul 2 01:52:37.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.583117 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:37.583356 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:37.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.588276 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:52:37.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.593338 systemd[1]: Finished systemd-network-generator.service. Jul 2 01:52:37.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.598919 systemd[1]: Finished systemd-remount-fs.service. Jul 2 01:52:37.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.604304 systemd[1]: Reached target network-pre.target. Jul 2 01:52:37.609977 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 01:52:37.615737 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 01:52:37.620343 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 01:52:37.622200 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 01:52:37.627810 systemd[1]: Starting systemd-journal-flush.service... Jul 2 01:52:37.632485 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:37.633741 systemd[1]: Starting systemd-random-seed.service... Jul 2 01:52:37.638167 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:37.639432 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:52:37.644665 systemd[1]: Starting systemd-sysusers.service... Jul 2 01:52:37.653515 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:52:37.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.658596 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 01:52:37.663812 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 01:52:37.669937 systemd[1]: Starting systemd-udev-settle.service... Jul 2 01:52:37.677408 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 01:52:37.696635 systemd-journald[1153]: Time spent on flushing to /var/log/journal/4f4bf836226f48fdb18d7e79859cb5b7 is 13.458ms for 1067 entries. Jul 2 01:52:37.696635 systemd-journald[1153]: System Journal (/var/log/journal/4f4bf836226f48fdb18d7e79859cb5b7) is 8.0M, max 2.6G, 2.6G free. Jul 2 01:52:37.901005 systemd-journald[1153]: Received client request to flush runtime journal. Jul 2 01:52:37.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:37.729137 systemd[1]: Finished systemd-random-seed.service. Jul 2 01:52:37.734174 systemd[1]: Reached target first-boot-complete.target. Jul 2 01:52:37.759179 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:52:37.902055 systemd[1]: Finished systemd-journal-flush.service. Jul 2 01:52:37.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:38.365940 systemd[1]: Finished systemd-sysusers.service. Jul 2 01:52:38.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:39.558933 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 01:52:39.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:39.564000 audit: BPF prog-id=18 op=LOAD Jul 2 01:52:39.564000 audit: BPF prog-id=19 op=LOAD Jul 2 01:52:39.564000 audit: BPF prog-id=7 op=UNLOAD Jul 2 01:52:39.564000 audit: BPF prog-id=8 op=UNLOAD Jul 2 01:52:39.565856 systemd[1]: Starting systemd-udevd.service... Jul 2 01:52:39.585228 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Jul 2 01:52:42.412364 systemd[1]: Started systemd-udevd.service. Jul 2 01:52:42.444888 kernel: kauditd_printk_skb: 43 callbacks suppressed Jul 2 01:52:42.444994 kernel: audit: type=1130 audit(1719885162.420:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:42.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:42.445869 systemd[1]: Starting systemd-networkd.service... Jul 2 01:52:42.443000 audit: BPF prog-id=20 op=LOAD Jul 2 01:52:42.462510 kernel: audit: type=1334 audit(1719885162.443:140): prog-id=20 op=LOAD Jul 2 01:52:42.469661 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 01:52:42.568000 audit[1214]: AVC avc: denied { confidentiality } for pid=1214 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 01:52:42.599532 kernel: audit: type=1400 audit(1719885162.568:141): avc: denied { confidentiality } for pid=1214 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 01:52:42.599634 kernel: hv_vmbus: registering driver hv_balloon Jul 2 01:52:42.599679 kernel: hv_vmbus: registering driver hyperv_fb Jul 2 01:52:42.603501 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Jul 2 01:52:42.613268 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Jul 2 01:52:42.613387 kernel: hv_balloon: Memory hot add disabled on ARM64 Jul 2 01:52:42.624358 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Jul 2 01:52:42.630440 kernel: Console: switching to colour dummy device 80x25 Jul 2 01:52:42.635864 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:52:42.568000 audit[1214]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed800e30 a1=aa2c a2=ffffae4924b0 a3=aaaaed75a010 items=12 ppid=1198 pid=1214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:42.568000 audit: CWD cwd="/" Jul 2 01:52:42.678200 kernel: audit: type=1300 audit(1719885162.568:141): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed800e30 a1=aa2c a2=ffffae4924b0 a3=aaaaed75a010 items=12 ppid=1198 pid=1214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:42.678332 kernel: audit: type=1307 audit(1719885162.568:141): cwd="/" Jul 2 01:52:42.678361 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 01:52:42.678390 kernel: audit: type=1302 audit(1719885162.568:141): item=0 name=(null) inode=6787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=0 name=(null) inode=6787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=1 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.710481 kernel: audit: type=1302 audit(1719885162.568:141): item=1 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.710604 kernel: audit: type=1302 audit(1719885162.568:141): item=2 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=2 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=3 name=(null) inode=10570 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.741323 kernel: audit: type=1302 audit(1719885162.568:141): item=3 name=(null) inode=10570 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.741380 kernel: audit: type=1302 audit(1719885162.568:141): item=4 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=4 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=5 name=(null) inode=10571 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=6 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=7 name=(null) inode=10572 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=8 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=9 name=(null) inode=10573 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=10 name=(null) inode=10569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PATH item=11 name=(null) inode=10574 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:42.568000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 01:52:42.818076 kernel: hv_utils: Registering HyperV Utility Driver Jul 2 01:52:42.818212 kernel: hv_vmbus: registering driver hv_utils Jul 2 01:52:42.825032 kernel: hv_utils: Shutdown IC version 3.2 Jul 2 01:52:42.825169 kernel: hv_utils: Heartbeat IC version 3.0 Jul 2 01:52:42.825234 kernel: hv_utils: TimeSync IC version 4.0 Jul 2 01:52:42.575000 audit: BPF prog-id=21 op=LOAD Jul 2 01:52:43.310429 systemd-journald[1153]: Time jumped backwards, rotating. Jul 2 01:52:42.575000 audit: BPF prog-id=22 op=LOAD Jul 2 01:52:42.575000 audit: BPF prog-id=23 op=LOAD Jul 2 01:52:42.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:42.577070 systemd[1]: Starting systemd-userdbd.service... Jul 2 01:52:42.692010 systemd[1]: Started systemd-userdbd.service. Jul 2 01:52:43.384383 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1202) Jul 2 01:52:43.402442 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:52:43.428816 systemd[1]: Finished systemd-udev-settle.service. Jul 2 01:52:43.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:43.435333 systemd[1]: Starting lvm2-activation-early.service... Jul 2 01:52:43.631475 systemd-networkd[1219]: lo: Link UP Jul 2 01:52:43.631484 systemd-networkd[1219]: lo: Gained carrier Jul 2 01:52:43.631894 systemd-networkd[1219]: Enumeration completed Jul 2 01:52:43.632013 systemd[1]: Started systemd-networkd.service. Jul 2 01:52:43.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:43.638084 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:52:43.696484 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:52:43.746399 kernel: mlx5_core 31e1:00:02.0 enP12769s1: Link up Jul 2 01:52:43.773382 kernel: hv_netvsc 002248c1-6a3d-0022-48c1-6a3d002248c1 eth0: Data path switched to VF: enP12769s1 Jul 2 01:52:43.773454 systemd-networkd[1219]: enP12769s1: Link UP Jul 2 01:52:43.773571 systemd-networkd[1219]: eth0: Link UP Jul 2 01:52:43.773575 systemd-networkd[1219]: eth0: Gained carrier Jul 2 01:52:43.778651 systemd-networkd[1219]: enP12769s1: Gained carrier Jul 2 01:52:43.789473 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.45/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:52:44.416074 lvm[1276]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:52:44.676490 systemd[1]: Finished lvm2-activation-early.service. Jul 2 01:52:44.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.681397 systemd[1]: Reached target cryptsetup.target. Jul 2 01:52:44.687183 systemd[1]: Starting lvm2-activation.service... Jul 2 01:52:44.691152 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:52:44.718308 systemd[1]: Finished lvm2-activation.service. Jul 2 01:52:44.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.724114 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:52:44.729763 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 01:52:44.729793 systemd[1]: Reached target local-fs.target. Jul 2 01:52:44.734765 systemd[1]: Reached target machines.target. Jul 2 01:52:44.741821 systemd[1]: Starting ldconfig.service... Jul 2 01:52:44.760646 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:44.760723 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:44.762043 systemd[1]: Starting systemd-boot-update.service... Jul 2 01:52:44.767681 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 01:52:44.774593 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 01:52:44.780481 systemd[1]: Starting systemd-sysext.service... Jul 2 01:52:44.977755 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1280 (bootctl) Jul 2 01:52:44.979212 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 01:52:45.045550 systemd-networkd[1219]: eth0: Gained IPv6LL Jul 2 01:52:45.052460 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:52:45.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.326175 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 01:52:45.531443 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 01:52:45.624784 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 01:52:45.624988 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 01:52:45.809383 kernel: loop0: detected capacity change from 0 to 194512 Jul 2 01:52:45.816956 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 01:52:45.817638 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 01:52:45.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.847418 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 01:52:45.867381 kernel: loop1: detected capacity change from 0 to 194512 Jul 2 01:52:45.871730 (sd-sysext)[1292]: Using extensions 'kubernetes'. Jul 2 01:52:45.873195 (sd-sysext)[1292]: Merged extensions into '/usr'. Jul 2 01:52:45.890537 systemd[1]: Mounting usr-share-oem.mount... Jul 2 01:52:45.894769 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.896535 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:45.902129 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:45.908148 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:45.912297 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.912611 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:45.915146 systemd[1]: Mounted usr-share-oem.mount. Jul 2 01:52:45.920913 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:45.921211 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:45.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.926912 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:45.927155 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:45.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.932765 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:45.933017 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:45.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.938177 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:45.938400 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.939842 systemd[1]: Finished systemd-sysext.service. Jul 2 01:52:45.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.946067 systemd[1]: Starting ensure-sysext.service... Jul 2 01:52:45.951602 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 01:52:45.959879 systemd[1]: Reloading. Jul 2 01:52:46.005973 /usr/lib/systemd/system-generators/torcx-generator[1318]: time="2024-07-02T01:52:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:52:46.006010 /usr/lib/systemd/system-generators/torcx-generator[1318]: time="2024-07-02T01:52:46Z" level=info msg="torcx already run" Jul 2 01:52:46.100178 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:52:46.100206 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:52:46.115891 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:52:46.180000 audit: BPF prog-id=24 op=LOAD Jul 2 01:52:46.180000 audit: BPF prog-id=15 op=UNLOAD Jul 2 01:52:46.180000 audit: BPF prog-id=25 op=LOAD Jul 2 01:52:46.180000 audit: BPF prog-id=26 op=LOAD Jul 2 01:52:46.180000 audit: BPF prog-id=16 op=UNLOAD Jul 2 01:52:46.180000 audit: BPF prog-id=17 op=UNLOAD Jul 2 01:52:46.181000 audit: BPF prog-id=27 op=LOAD Jul 2 01:52:46.181000 audit: BPF prog-id=21 op=UNLOAD Jul 2 01:52:46.181000 audit: BPF prog-id=28 op=LOAD Jul 2 01:52:46.181000 audit: BPF prog-id=29 op=LOAD Jul 2 01:52:46.181000 audit: BPF prog-id=22 op=UNLOAD Jul 2 01:52:46.181000 audit: BPF prog-id=23 op=UNLOAD Jul 2 01:52:46.181000 audit: BPF prog-id=30 op=LOAD Jul 2 01:52:46.181000 audit: BPF prog-id=20 op=UNLOAD Jul 2 01:52:46.183000 audit: BPF prog-id=31 op=LOAD Jul 2 01:52:46.183000 audit: BPF prog-id=32 op=LOAD Jul 2 01:52:46.183000 audit: BPF prog-id=18 op=UNLOAD Jul 2 01:52:46.183000 audit: BPF prog-id=19 op=UNLOAD Jul 2 01:52:46.196431 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.197883 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:46.203271 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:46.208879 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:46.212990 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.213129 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:46.214030 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:46.214185 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:46.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.219075 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:46.219210 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:46.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.224546 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:46.224688 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:46.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.229953 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:46.230049 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.231628 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.233139 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:46.239121 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:46.245021 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:46.248851 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.248998 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:46.249872 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:46.250025 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:46.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.254938 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:46.255072 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:46.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.261681 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:46.261823 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:46.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.267036 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:46.267132 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.269434 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.270888 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:46.276595 systemd[1]: Starting modprobe@drm.service... Jul 2 01:52:46.283228 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:46.283656 systemd-fsck[1288]: fsck.fat 4.2 (2021-01-31) Jul 2 01:52:46.283656 systemd-fsck[1288]: /dev/sda1: 236 files, 117047/258078 clusters Jul 2 01:52:46.289076 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:46.293007 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.293162 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:46.294286 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 01:52:46.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.300987 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:46.301121 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:46.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.306780 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:52:46.306916 systemd[1]: Finished modprobe@drm.service. Jul 2 01:52:46.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.311732 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:46.311865 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:46.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.317568 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:46.317749 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:46.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.325646 systemd[1]: Finished ensure-sysext.service. Jul 2 01:52:46.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.332784 systemd[1]: Mounting boot.mount... Jul 2 01:52:46.336307 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:46.336603 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:46.559340 systemd[1]: Mounted boot.mount. Jul 2 01:52:46.570320 systemd[1]: Finished systemd-boot-update.service. Jul 2 01:52:46.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.930428 systemd-tmpfiles[1299]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 01:52:47.295504 systemd-tmpfiles[1299]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 01:52:47.795574 systemd-tmpfiles[1299]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 01:52:49.547007 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 01:52:49.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.558697 kernel: kauditd_printk_skb: 67 callbacks suppressed Jul 2 01:52:49.558753 kernel: audit: type=1130 audit(1719885169.553:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.560076 systemd[1]: Starting audit-rules.service... Jul 2 01:52:49.582794 systemd[1]: Starting clean-ca-certificates.service... Jul 2 01:52:49.588607 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 01:52:49.594000 audit: BPF prog-id=33 op=LOAD Jul 2 01:52:49.595785 systemd[1]: Starting systemd-resolved.service... Jul 2 01:52:49.604596 kernel: audit: type=1334 audit(1719885169.594:202): prog-id=33 op=LOAD Jul 2 01:52:49.605000 audit: BPF prog-id=34 op=LOAD Jul 2 01:52:49.607417 systemd[1]: Starting systemd-timesyncd.service... Jul 2 01:52:49.616861 kernel: audit: type=1334 audit(1719885169.605:203): prog-id=34 op=LOAD Jul 2 01:52:49.618926 systemd[1]: Starting systemd-update-utmp.service... Jul 2 01:52:49.871000 audit[1398]: SYSTEM_BOOT pid=1398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.891006 systemd[1]: Started systemd-timesyncd.service. Jul 2 01:52:49.898166 kernel: audit: type=1127 audit(1719885169.871:204): pid=1398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.897052 systemd[1]: Reached target time-set.target. Jul 2 01:52:49.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.919074 systemd[1]: Finished clean-ca-certificates.service. Jul 2 01:52:49.924747 kernel: audit: type=1130 audit(1719885169.896:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.925470 systemd[1]: Finished systemd-update-utmp.service. Jul 2 01:52:49.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.951716 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 01:52:49.970328 kernel: audit: type=1130 audit(1719885169.924:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.970423 kernel: audit: type=1130 audit(1719885169.950:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.978324 systemd-resolved[1396]: Positive Trust Anchors: Jul 2 01:52:49.978685 systemd-resolved[1396]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:52:49.978770 systemd-resolved[1396]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:52:49.983530 systemd-resolved[1396]: Using system hostname 'ci-3510.3.5-a-bbfd170fa1'. Jul 2 01:52:49.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:49.985252 systemd[1]: Started systemd-resolved.service. Jul 2 01:52:49.990134 systemd[1]: Reached target network.target. Jul 2 01:52:50.014901 kernel: audit: type=1130 audit(1719885169.989:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:50.015339 systemd[1]: Reached target network-online.target. Jul 2 01:52:50.020534 systemd[1]: Reached target nss-lookup.target. Jul 2 01:52:50.354256 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 01:52:50.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:50.380416 kernel: audit: type=1130 audit(1719885170.359:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:50.570236 systemd-timesyncd[1397]: Contacted time server 69.10.223.134:123 (0.flatcar.pool.ntp.org). Jul 2 01:52:50.570308 systemd-timesyncd[1397]: Initial clock synchronization to Tue 2024-07-02 01:52:50.605030 UTC. Jul 2 01:52:50.767000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:52:50.767000 audit[1414]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe98859d0 a2=420 a3=0 items=0 ppid=1393 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:50.767000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 01:52:50.781380 kernel: audit: type=1305 audit(1719885170.767:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:52:50.969385 augenrules[1414]: No rules Jul 2 01:52:50.970390 systemd[1]: Finished audit-rules.service. Jul 2 01:52:59.341105 ldconfig[1279]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 01:52:59.350483 systemd[1]: Finished ldconfig.service. Jul 2 01:52:59.356568 systemd[1]: Starting systemd-update-done.service... Jul 2 01:52:59.378345 systemd[1]: Finished systemd-update-done.service. Jul 2 01:52:59.383058 systemd[1]: Reached target sysinit.target. Jul 2 01:52:59.387469 systemd[1]: Started motdgen.path. Jul 2 01:52:59.391279 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 01:52:59.397278 systemd[1]: Started logrotate.timer. Jul 2 01:52:59.401244 systemd[1]: Started mdadm.timer. Jul 2 01:52:59.405665 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 01:52:59.410171 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 01:52:59.410200 systemd[1]: Reached target paths.target. Jul 2 01:52:59.414188 systemd[1]: Reached target timers.target. Jul 2 01:52:59.418518 systemd[1]: Listening on dbus.socket. Jul 2 01:52:59.423896 systemd[1]: Starting docker.socket... Jul 2 01:52:59.443297 systemd[1]: Listening on sshd.socket. Jul 2 01:52:59.447277 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:59.447835 systemd[1]: Listening on docker.socket. Jul 2 01:52:59.451902 systemd[1]: Reached target sockets.target. Jul 2 01:52:59.456029 systemd[1]: Reached target basic.target. Jul 2 01:52:59.460256 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:52:59.460284 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:52:59.461513 systemd[1]: Starting containerd.service... Jul 2 01:52:59.466345 systemd[1]: Starting dbus.service... Jul 2 01:52:59.470647 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 01:52:59.475971 systemd[1]: Starting extend-filesystems.service... Jul 2 01:52:59.480133 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 01:52:59.494315 systemd[1]: Starting kubelet.service... Jul 2 01:52:59.501763 systemd[1]: Starting motdgen.service... Jul 2 01:52:59.506388 systemd[1]: Started nvidia.service. Jul 2 01:52:59.511606 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 01:52:59.517511 systemd[1]: Starting sshd-keygen.service... Jul 2 01:52:59.523738 systemd[1]: Starting systemd-logind.service... Jul 2 01:52:59.527661 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:59.527732 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 01:52:59.528186 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 01:52:59.529067 systemd[1]: Starting update-engine.service... Jul 2 01:52:59.532340 jq[1424]: false Jul 2 01:52:59.535025 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 01:52:59.539516 jq[1436]: true Jul 2 01:52:59.556052 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 01:52:59.556261 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 01:52:59.557513 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 01:52:59.557714 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 01:52:59.575979 extend-filesystems[1425]: Found loop1 Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda1 Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda2 Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda3 Jul 2 01:52:59.575979 extend-filesystems[1425]: Found usr Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda4 Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda6 Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda7 Jul 2 01:52:59.575979 extend-filesystems[1425]: Found sda9 Jul 2 01:52:59.575979 extend-filesystems[1425]: Checking size of /dev/sda9 Jul 2 01:52:59.612796 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 01:52:59.635319 jq[1442]: true Jul 2 01:52:59.612999 systemd[1]: Finished motdgen.service. Jul 2 01:52:59.712747 systemd-logind[1433]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 01:52:59.712971 systemd-logind[1433]: New seat seat0. Jul 2 01:52:59.731361 extend-filesystems[1425]: Old size kept for /dev/sda9 Jul 2 01:52:59.731361 extend-filesystems[1425]: Found sr0 Jul 2 01:52:59.728300 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 01:52:59.728482 systemd[1]: Finished extend-filesystems.service. Jul 2 01:52:59.774895 env[1447]: time="2024-07-02T01:52:59.771539583Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 01:52:59.841129 env[1447]: time="2024-07-02T01:52:59.841075204Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 01:52:59.841286 env[1447]: time="2024-07-02T01:52:59.841222075Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:59.843629 env[1447]: time="2024-07-02T01:52:59.843556230Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:52:59.843629 env[1447]: time="2024-07-02T01:52:59.843603852Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.843853937Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.843872521Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.843928153Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.843940850Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.844026241Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.846671481Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.846897735Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.846917040Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.847051415Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 01:52:59.848193 env[1447]: time="2024-07-02T01:52:59.847064592Z" level=info msg="metadata content store policy set" policy=shared Jul 2 01:52:59.855931 bash[1466]: Updated "/home/core/.ssh/authorized_keys" Jul 2 01:52:59.849668 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 01:52:59.864679 env[1447]: time="2024-07-02T01:52:59.864217977Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 01:52:59.864679 env[1447]: time="2024-07-02T01:52:59.864269324Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 01:52:59.864679 env[1447]: time="2024-07-02T01:52:59.864282701Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 01:52:59.864679 env[1447]: time="2024-07-02T01:52:59.864323514Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.864679 env[1447]: time="2024-07-02T01:52:59.864339375Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.864679 env[1447]: time="2024-07-02T01:52:59.864455206Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.864679 env[1447]: time="2024-07-02T01:52:59.864474310Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.864938234Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.864969875Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.864983733Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.864996269Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865009887Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865148307Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865217357Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865455026Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865481100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865495118Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865540617Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865553434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865566170Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.866967 env[1447]: time="2024-07-02T01:52:59.865577225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865589681Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865602217Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865613071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865624646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865637703Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865757419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865773840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865786016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865797912Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865811690Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865822263Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865839285Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 01:52:59.867318 env[1447]: time="2024-07-02T01:52:59.865874772Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 01:52:59.867581 systemd[1]: Started containerd.service. Jul 2 01:52:59.867696 env[1447]: time="2024-07-02T01:52:59.866065179Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 01:52:59.867696 env[1447]: time="2024-07-02T01:52:59.866117647Z" level=info msg="Connect containerd service" Jul 2 01:52:59.867696 env[1447]: time="2024-07-02T01:52:59.866153894Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 01:52:59.867696 env[1447]: time="2024-07-02T01:52:59.867151151Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:52:59.867696 env[1447]: time="2024-07-02T01:52:59.867420862Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 01:52:59.867696 env[1447]: time="2024-07-02T01:52:59.867459072Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 01:52:59.887385 env[1447]: time="2024-07-02T01:52:59.869385016Z" level=info msg="Start subscribing containerd event" Jul 2 01:52:59.887385 env[1447]: time="2024-07-02T01:52:59.869447658Z" level=info msg="Start recovering state" Jul 2 01:52:59.887385 env[1447]: time="2024-07-02T01:52:59.869522995Z" level=info msg="Start event monitor" Jul 2 01:52:59.887385 env[1447]: time="2024-07-02T01:52:59.869541299Z" level=info msg="Start snapshots syncer" Jul 2 01:52:59.887385 env[1447]: time="2024-07-02T01:52:59.869551352Z" level=info msg="Start cni network conf syncer for default" Jul 2 01:52:59.887385 env[1447]: time="2024-07-02T01:52:59.869560484Z" level=info msg="Start streaming server" Jul 2 01:52:59.887385 env[1447]: time="2024-07-02T01:52:59.871846857Z" level=info msg="containerd successfully booted in 0.107626s" Jul 2 01:52:59.980944 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 01:53:00.024033 dbus-daemon[1423]: [system] SELinux support is enabled Jul 2 01:53:00.024254 systemd[1]: Started dbus.service. Jul 2 01:53:00.029803 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 01:53:00.030339 dbus-daemon[1423]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 01:53:00.029832 systemd[1]: Reached target system-config.target. Jul 2 01:53:00.034656 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 01:53:00.034682 systemd[1]: Reached target user-config.target. Jul 2 01:53:00.041526 systemd[1]: Started systemd-logind.service. Jul 2 01:53:00.427673 update_engine[1434]: I0702 01:53:00.399684 1434 main.cc:92] Flatcar Update Engine starting Jul 2 01:53:00.468200 systemd[1]: Started update-engine.service. Jul 2 01:53:00.468625 update_engine[1434]: I0702 01:53:00.468250 1434 update_check_scheduler.cc:74] Next update check in 2m16s Jul 2 01:53:00.475430 systemd[1]: Started locksmithd.service. Jul 2 01:53:00.576882 systemd[1]: Started kubelet.service. Jul 2 01:53:00.873029 sshd_keygen[1444]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 01:53:00.894710 systemd[1]: Finished sshd-keygen.service. Jul 2 01:53:00.900899 systemd[1]: Starting issuegen.service... Jul 2 01:53:00.906489 systemd[1]: Started waagent.service. Jul 2 01:53:00.913444 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 01:53:00.913607 systemd[1]: Finished issuegen.service. Jul 2 01:53:00.919462 systemd[1]: Starting systemd-user-sessions.service... Jul 2 01:53:01.097220 kubelet[1522]: E0702 01:53:01.097131 1522 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:01.099271 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:01.099424 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:01.194211 systemd[1]: Finished systemd-user-sessions.service. Jul 2 01:53:01.201172 systemd[1]: Started getty@tty1.service. Jul 2 01:53:01.208040 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 01:53:01.213447 systemd[1]: Reached target getty.target. Jul 2 01:53:01.217716 systemd[1]: Reached target multi-user.target. Jul 2 01:53:01.223661 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 01:53:01.232070 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 01:53:01.232254 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 01:53:01.238445 systemd[1]: Startup finished in 782ms (kernel) + 12.353s (initrd) + 34.576s (userspace) = 47.712s. Jul 2 01:53:03.280281 login[1542]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Jul 2 01:53:03.542832 login[1543]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:53:03.612206 systemd[1]: Created slice user-500.slice. Jul 2 01:53:03.613422 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 01:53:03.615956 systemd-logind[1433]: New session 2 of user core. Jul 2 01:53:03.709705 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 01:53:03.711315 systemd[1]: Starting user@500.service... Jul 2 01:53:03.960007 (systemd)[1549]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:04.281082 login[1542]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:53:04.285202 systemd-logind[1433]: New session 1 of user core. Jul 2 01:53:04.538754 systemd[1549]: Queued start job for default target default.target. Jul 2 01:53:04.539654 systemd[1549]: Reached target paths.target. Jul 2 01:53:04.539807 systemd[1549]: Reached target sockets.target. Jul 2 01:53:04.539981 systemd[1549]: Reached target timers.target. Jul 2 01:53:04.540068 systemd[1549]: Reached target basic.target. Jul 2 01:53:04.540254 systemd[1]: Started user@500.service. Jul 2 01:53:04.540912 systemd[1549]: Reached target default.target. Jul 2 01:53:04.540956 systemd[1549]: Startup finished in 574ms. Jul 2 01:53:04.541179 systemd[1]: Started session-1.scope. Jul 2 01:53:04.541799 systemd[1]: Started session-2.scope. Jul 2 01:53:04.649894 locksmithd[1519]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 01:53:11.311313 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 01:53:11.311520 systemd[1]: Stopped kubelet.service. Jul 2 01:53:11.312943 systemd[1]: Starting kubelet.service... Jul 2 01:53:18.398440 systemd[1]: Started kubelet.service. Jul 2 01:53:18.443756 kubelet[1577]: E0702 01:53:18.443692 1577 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:18.446729 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:18.446851 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:22.273468 waagent[1536]: 2024-07-02T01:53:22.273327Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Jul 2 01:53:22.295656 waagent[1536]: 2024-07-02T01:53:22.295554Z INFO Daemon Daemon OS: flatcar 3510.3.5 Jul 2 01:53:22.300293 waagent[1536]: 2024-07-02T01:53:22.300208Z INFO Daemon Daemon Python: 3.9.16 Jul 2 01:53:22.304899 waagent[1536]: 2024-07-02T01:53:22.304718Z INFO Daemon Daemon Run daemon Jul 2 01:53:22.312369 waagent[1536]: 2024-07-02T01:53:22.309387Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.5' Jul 2 01:53:22.350232 waagent[1536]: 2024-07-02T01:53:22.350058Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:53:22.365951 waagent[1536]: 2024-07-02T01:53:22.365787Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:53:22.375778 waagent[1536]: 2024-07-02T01:53:22.375687Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:53:22.381045 waagent[1536]: 2024-07-02T01:53:22.380954Z INFO Daemon Daemon Using waagent for provisioning Jul 2 01:53:22.387387 waagent[1536]: 2024-07-02T01:53:22.387285Z INFO Daemon Daemon Activate resource disk Jul 2 01:53:22.392172 waagent[1536]: 2024-07-02T01:53:22.392087Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Jul 2 01:53:22.407435 waagent[1536]: 2024-07-02T01:53:22.407312Z INFO Daemon Daemon Found device: None Jul 2 01:53:22.412366 waagent[1536]: 2024-07-02T01:53:22.412272Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Jul 2 01:53:22.420947 waagent[1536]: 2024-07-02T01:53:22.420865Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Jul 2 01:53:22.433101 waagent[1536]: 2024-07-02T01:53:22.433026Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:53:22.439019 waagent[1536]: 2024-07-02T01:53:22.438934Z INFO Daemon Daemon Running default provisioning handler Jul 2 01:53:22.452909 waagent[1536]: 2024-07-02T01:53:22.452740Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:53:22.468570 waagent[1536]: 2024-07-02T01:53:22.468407Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:53:22.478952 waagent[1536]: 2024-07-02T01:53:22.478860Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:53:22.484443 waagent[1536]: 2024-07-02T01:53:22.484342Z INFO Daemon Daemon Copying ovf-env.xml Jul 2 01:53:22.581835 waagent[1536]: 2024-07-02T01:53:22.581672Z INFO Daemon Daemon Successfully mounted dvd Jul 2 01:53:22.643946 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Jul 2 01:53:22.717186 waagent[1536]: 2024-07-02T01:53:22.717020Z INFO Daemon Daemon Detect protocol endpoint Jul 2 01:53:22.722612 waagent[1536]: 2024-07-02T01:53:22.722515Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:53:22.728442 waagent[1536]: 2024-07-02T01:53:22.728343Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Jul 2 01:53:22.734883 waagent[1536]: 2024-07-02T01:53:22.734798Z INFO Daemon Daemon Test for route to 168.63.129.16 Jul 2 01:53:22.740280 waagent[1536]: 2024-07-02T01:53:22.740201Z INFO Daemon Daemon Route to 168.63.129.16 exists Jul 2 01:53:22.747028 waagent[1536]: 2024-07-02T01:53:22.746940Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Jul 2 01:53:22.921279 waagent[1536]: 2024-07-02T01:53:22.921154Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Jul 2 01:53:22.929020 waagent[1536]: 2024-07-02T01:53:22.928971Z INFO Daemon Daemon Wire protocol version:2012-11-30 Jul 2 01:53:22.936003 waagent[1536]: 2024-07-02T01:53:22.935905Z INFO Daemon Daemon Server preferred version:2015-04-05 Jul 2 01:53:23.370951 waagent[1536]: 2024-07-02T01:53:23.370789Z INFO Daemon Daemon Initializing goal state during protocol detection Jul 2 01:53:23.387037 waagent[1536]: 2024-07-02T01:53:23.386938Z INFO Daemon Daemon Forcing an update of the goal state.. Jul 2 01:53:23.394775 waagent[1536]: 2024-07-02T01:53:23.394652Z INFO Daemon Daemon Fetching goal state [incarnation 1] Jul 2 01:53:23.475272 waagent[1536]: 2024-07-02T01:53:23.475114Z INFO Daemon Daemon Found private key matching thumbprint 48DD9D33283A762AFCB811594CA910CE439E094F Jul 2 01:53:23.484614 waagent[1536]: 2024-07-02T01:53:23.484511Z INFO Daemon Daemon Certificate with thumbprint 79BFD8AD9F47301FD7440A6BBE3C131F255C0E2C has no matching private key. Jul 2 01:53:23.494299 waagent[1536]: 2024-07-02T01:53:23.494190Z INFO Daemon Daemon Fetch goal state completed Jul 2 01:53:23.549214 waagent[1536]: 2024-07-02T01:53:23.549118Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 7adc8707-ad9d-4d16-8dbc-49e86d1593fb New eTag: 11913685050704740268] Jul 2 01:53:23.560201 waagent[1536]: 2024-07-02T01:53:23.560105Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:53:23.576688 waagent[1536]: 2024-07-02T01:53:23.576611Z INFO Daemon Daemon Starting provisioning Jul 2 01:53:23.582204 waagent[1536]: 2024-07-02T01:53:23.582097Z INFO Daemon Daemon Handle ovf-env.xml. Jul 2 01:53:23.587197 waagent[1536]: 2024-07-02T01:53:23.587100Z INFO Daemon Daemon Set hostname [ci-3510.3.5-a-bbfd170fa1] Jul 2 01:53:23.639222 waagent[1536]: 2024-07-02T01:53:23.639068Z INFO Daemon Daemon Publish hostname [ci-3510.3.5-a-bbfd170fa1] Jul 2 01:53:23.645945 waagent[1536]: 2024-07-02T01:53:23.645837Z INFO Daemon Daemon Examine /proc/net/route for primary interface Jul 2 01:53:23.653055 waagent[1536]: 2024-07-02T01:53:23.652945Z INFO Daemon Daemon Primary interface is [eth0] Jul 2 01:53:23.670642 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Jul 2 01:53:23.670823 systemd[1]: Stopped systemd-networkd-wait-online.service. Jul 2 01:53:23.670884 systemd[1]: Stopping systemd-networkd-wait-online.service... Jul 2 01:53:23.671129 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:53:23.677407 systemd-networkd[1219]: eth0: DHCPv6 lease lost Jul 2 01:53:23.679530 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:53:23.679716 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:53:23.681902 systemd[1]: Starting systemd-networkd.service... Jul 2 01:53:23.710749 systemd-networkd[1607]: enP12769s1: Link UP Jul 2 01:53:23.710762 systemd-networkd[1607]: enP12769s1: Gained carrier Jul 2 01:53:23.711672 systemd-networkd[1607]: eth0: Link UP Jul 2 01:53:23.711683 systemd-networkd[1607]: eth0: Gained carrier Jul 2 01:53:23.711998 systemd-networkd[1607]: lo: Link UP Jul 2 01:53:23.712007 systemd-networkd[1607]: lo: Gained carrier Jul 2 01:53:23.712243 systemd-networkd[1607]: eth0: Gained IPv6LL Jul 2 01:53:23.713530 systemd-networkd[1607]: Enumeration completed Jul 2 01:53:23.713667 systemd[1]: Started systemd-networkd.service. Jul 2 01:53:23.715572 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:53:23.719128 waagent[1536]: 2024-07-02T01:53:23.718961Z INFO Daemon Daemon Create user account if not exists Jul 2 01:53:23.724819 waagent[1536]: 2024-07-02T01:53:23.724722Z INFO Daemon Daemon User core already exists, skip useradd Jul 2 01:53:23.730935 systemd-networkd[1607]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:53:23.731639 waagent[1536]: 2024-07-02T01:53:23.731528Z INFO Daemon Daemon Configure sudoer Jul 2 01:53:23.736827 waagent[1536]: 2024-07-02T01:53:23.736737Z INFO Daemon Daemon Configure sshd Jul 2 01:53:23.741329 waagent[1536]: 2024-07-02T01:53:23.741242Z INFO Daemon Daemon Deploy ssh public key. Jul 2 01:53:23.751512 systemd-networkd[1607]: eth0: DHCPv4 address 10.200.20.45/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:53:23.754453 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:53:25.042358 waagent[1536]: 2024-07-02T01:53:25.042274Z INFO Daemon Daemon Provisioning complete Jul 2 01:53:25.063437 waagent[1536]: 2024-07-02T01:53:25.063369Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Jul 2 01:53:25.069584 waagent[1536]: 2024-07-02T01:53:25.069496Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Jul 2 01:53:25.079966 waagent[1536]: 2024-07-02T01:53:25.079881Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Jul 2 01:53:25.396341 waagent[1616]: 2024-07-02T01:53:25.396245Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Jul 2 01:53:25.397528 waagent[1616]: 2024-07-02T01:53:25.397467Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:25.397779 waagent[1616]: 2024-07-02T01:53:25.397732Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:25.410865 waagent[1616]: 2024-07-02T01:53:25.410762Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Jul 2 01:53:25.411211 waagent[1616]: 2024-07-02T01:53:25.411163Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Jul 2 01:53:25.484914 waagent[1616]: 2024-07-02T01:53:25.484765Z INFO ExtHandler ExtHandler Found private key matching thumbprint 48DD9D33283A762AFCB811594CA910CE439E094F Jul 2 01:53:25.485319 waagent[1616]: 2024-07-02T01:53:25.485266Z INFO ExtHandler ExtHandler Certificate with thumbprint 79BFD8AD9F47301FD7440A6BBE3C131F255C0E2C has no matching private key. Jul 2 01:53:25.485680 waagent[1616]: 2024-07-02T01:53:25.485629Z INFO ExtHandler ExtHandler Fetch goal state completed Jul 2 01:53:25.499929 waagent[1616]: 2024-07-02T01:53:25.499869Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 77804edc-1a93-4ea2-b295-1ddc103d4119 New eTag: 11913685050704740268] Jul 2 01:53:25.500752 waagent[1616]: 2024-07-02T01:53:25.500693Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:53:25.597850 waagent[1616]: 2024-07-02T01:53:25.597689Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:53:25.623384 waagent[1616]: 2024-07-02T01:53:25.623276Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1616 Jul 2 01:53:25.627555 waagent[1616]: 2024-07-02T01:53:25.627471Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:53:25.629119 waagent[1616]: 2024-07-02T01:53:25.629044Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:53:25.746881 waagent[1616]: 2024-07-02T01:53:25.746760Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:53:25.747517 waagent[1616]: 2024-07-02T01:53:25.747456Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:53:25.755946 waagent[1616]: 2024-07-02T01:53:25.755872Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:53:25.756705 waagent[1616]: 2024-07-02T01:53:25.756644Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:53:25.758083 waagent[1616]: 2024-07-02T01:53:25.758018Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Jul 2 01:53:25.759707 waagent[1616]: 2024-07-02T01:53:25.759636Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:53:25.759981 waagent[1616]: 2024-07-02T01:53:25.759912Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:25.760546 waagent[1616]: 2024-07-02T01:53:25.760476Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:25.761167 waagent[1616]: 2024-07-02T01:53:25.761101Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:53:25.761514 waagent[1616]: 2024-07-02T01:53:25.761452Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:53:25.761514 waagent[1616]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:53:25.761514 waagent[1616]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:53:25.761514 waagent[1616]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:53:25.761514 waagent[1616]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:25.761514 waagent[1616]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:25.761514 waagent[1616]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:25.764215 waagent[1616]: 2024-07-02T01:53:25.764041Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:53:25.764846 waagent[1616]: 2024-07-02T01:53:25.764767Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:25.765586 waagent[1616]: 2024-07-02T01:53:25.765514Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:25.766250 waagent[1616]: 2024-07-02T01:53:25.766173Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:53:25.766440 waagent[1616]: 2024-07-02T01:53:25.766390Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:53:25.766568 waagent[1616]: 2024-07-02T01:53:25.766526Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:53:25.767639 waagent[1616]: 2024-07-02T01:53:25.767593Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:53:25.768039 waagent[1616]: 2024-07-02T01:53:25.767502Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:53:25.768272 waagent[1616]: 2024-07-02T01:53:25.768191Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:53:25.768541 waagent[1616]: 2024-07-02T01:53:25.768467Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:53:25.768687 waagent[1616]: 2024-07-02T01:53:25.768623Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:53:25.781098 waagent[1616]: 2024-07-02T01:53:25.781022Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Jul 2 01:53:25.781939 waagent[1616]: 2024-07-02T01:53:25.781890Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:53:25.783004 waagent[1616]: 2024-07-02T01:53:25.782949Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Jul 2 01:53:25.822127 waagent[1616]: 2024-07-02T01:53:25.821975Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1607' Jul 2 01:53:25.830142 waagent[1616]: 2024-07-02T01:53:25.830060Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Jul 2 01:53:25.905829 waagent[1616]: 2024-07-02T01:53:25.905672Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:53:25.905829 waagent[1616]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:53:25.905829 waagent[1616]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:53:25.905829 waagent[1616]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:6a:3d brd ff:ff:ff:ff:ff:ff Jul 2 01:53:25.905829 waagent[1616]: 3: enP12769s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:6a:3d brd ff:ff:ff:ff:ff:ff\ altname enP12769p0s2 Jul 2 01:53:25.905829 waagent[1616]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:53:25.905829 waagent[1616]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:53:25.905829 waagent[1616]: 2: eth0 inet 10.200.20.45/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:53:25.905829 waagent[1616]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:53:25.905829 waagent[1616]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:53:25.905829 waagent[1616]: 2: eth0 inet6 fe80::222:48ff:fec1:6a3d/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:53:26.022724 waagent[1616]: 2024-07-02T01:53:26.022597Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.11.1.4 -- exiting Jul 2 01:53:26.082721 waagent[1536]: 2024-07-02T01:53:26.082553Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Jul 2 01:53:26.087366 waagent[1536]: 2024-07-02T01:53:26.087304Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.11.1.4 to be the latest agent Jul 2 01:53:27.328916 waagent[1645]: 2024-07-02T01:53:27.328802Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.11.1.4) Jul 2 01:53:27.329697 waagent[1645]: 2024-07-02T01:53:27.329631Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.5 Jul 2 01:53:27.329832 waagent[1645]: 2024-07-02T01:53:27.329786Z INFO ExtHandler ExtHandler Python: 3.9.16 Jul 2 01:53:27.329958 waagent[1645]: 2024-07-02T01:53:27.329915Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Jul 2 01:53:27.338761 waagent[1645]: 2024-07-02T01:53:27.338621Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:53:27.339195 waagent[1645]: 2024-07-02T01:53:27.339137Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:27.339340 waagent[1645]: 2024-07-02T01:53:27.339296Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:27.353991 waagent[1645]: 2024-07-02T01:53:27.353889Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Jul 2 01:53:27.364966 waagent[1645]: 2024-07-02T01:53:27.364907Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.151 Jul 2 01:53:27.366099 waagent[1645]: 2024-07-02T01:53:27.366037Z INFO ExtHandler Jul 2 01:53:27.366253 waagent[1645]: 2024-07-02T01:53:27.366205Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 530a1379-79b7-496a-b828-3bcd7d3b7884 eTag: 11913685050704740268 source: Fabric] Jul 2 01:53:27.367047 waagent[1645]: 2024-07-02T01:53:27.366989Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Jul 2 01:53:27.368306 waagent[1645]: 2024-07-02T01:53:27.368245Z INFO ExtHandler Jul 2 01:53:27.368471 waagent[1645]: 2024-07-02T01:53:27.368423Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Jul 2 01:53:27.375868 waagent[1645]: 2024-07-02T01:53:27.375812Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Jul 2 01:53:27.376418 waagent[1645]: 2024-07-02T01:53:27.376344Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:53:27.397921 waagent[1645]: 2024-07-02T01:53:27.397857Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Jul 2 01:53:27.475099 waagent[1645]: 2024-07-02T01:53:27.474948Z INFO ExtHandler Downloaded certificate {'thumbprint': '79BFD8AD9F47301FD7440A6BBE3C131F255C0E2C', 'hasPrivateKey': False} Jul 2 01:53:27.476271 waagent[1645]: 2024-07-02T01:53:27.476209Z INFO ExtHandler Downloaded certificate {'thumbprint': '48DD9D33283A762AFCB811594CA910CE439E094F', 'hasPrivateKey': True} Jul 2 01:53:27.477379 waagent[1645]: 2024-07-02T01:53:27.477304Z INFO ExtHandler Fetch goal state completed Jul 2 01:53:27.500753 waagent[1645]: 2024-07-02T01:53:27.500618Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Jul 2 01:53:27.514159 waagent[1645]: 2024-07-02T01:53:27.514030Z INFO ExtHandler ExtHandler WALinuxAgent-2.11.1.4 running as process 1645 Jul 2 01:53:27.518028 waagent[1645]: 2024-07-02T01:53:27.517934Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:53:27.519629 waagent[1645]: 2024-07-02T01:53:27.519542Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:53:27.525513 waagent[1645]: 2024-07-02T01:53:27.525440Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:53:27.525957 waagent[1645]: 2024-07-02T01:53:27.525895Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:53:27.534492 waagent[1645]: 2024-07-02T01:53:27.534422Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:53:27.535253 waagent[1645]: 2024-07-02T01:53:27.535194Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:53:27.542440 waagent[1645]: 2024-07-02T01:53:27.542285Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Jul 2 01:53:27.543902 waagent[1645]: 2024-07-02T01:53:27.543812Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Jul 2 01:53:27.546022 waagent[1645]: 2024-07-02T01:53:27.545940Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:53:27.546416 waagent[1645]: 2024-07-02T01:53:27.546310Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:27.547266 waagent[1645]: 2024-07-02T01:53:27.547183Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:53:27.547500 waagent[1645]: 2024-07-02T01:53:27.547434Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:27.548453 waagent[1645]: 2024-07-02T01:53:27.548371Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:53:27.549113 waagent[1645]: 2024-07-02T01:53:27.549040Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:53:27.549113 waagent[1645]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:53:27.549113 waagent[1645]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:53:27.549113 waagent[1645]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:53:27.549113 waagent[1645]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:27.549113 waagent[1645]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:27.549113 waagent[1645]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:27.551677 waagent[1645]: 2024-07-02T01:53:27.551481Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:53:27.552070 waagent[1645]: 2024-07-02T01:53:27.551995Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:27.552453 waagent[1645]: 2024-07-02T01:53:27.552337Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:53:27.552950 waagent[1645]: 2024-07-02T01:53:27.552882Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:27.553648 waagent[1645]: 2024-07-02T01:53:27.553586Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:53:27.553881 waagent[1645]: 2024-07-02T01:53:27.553834Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:53:27.554081 waagent[1645]: 2024-07-02T01:53:27.554036Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:53:27.554727 waagent[1645]: 2024-07-02T01:53:27.554650Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:53:27.555253 waagent[1645]: 2024-07-02T01:53:27.555183Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:53:27.555887 waagent[1645]: 2024-07-02T01:53:27.555817Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:53:27.577713 waagent[1645]: 2024-07-02T01:53:27.576264Z INFO ExtHandler ExtHandler Downloading agent manifest Jul 2 01:53:27.600245 waagent[1645]: 2024-07-02T01:53:27.600103Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:53:27.600245 waagent[1645]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:53:27.600245 waagent[1645]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:53:27.600245 waagent[1645]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:6a:3d brd ff:ff:ff:ff:ff:ff Jul 2 01:53:27.600245 waagent[1645]: 3: enP12769s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:6a:3d brd ff:ff:ff:ff:ff:ff\ altname enP12769p0s2 Jul 2 01:53:27.600245 waagent[1645]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:53:27.600245 waagent[1645]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:53:27.600245 waagent[1645]: 2: eth0 inet 10.200.20.45/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:53:27.600245 waagent[1645]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:53:27.600245 waagent[1645]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:53:27.600245 waagent[1645]: 2: eth0 inet6 fe80::222:48ff:fec1:6a3d/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:53:27.615498 waagent[1645]: 2024-07-02T01:53:27.615394Z INFO ExtHandler ExtHandler Jul 2 01:53:27.615897 waagent[1645]: 2024-07-02T01:53:27.615843Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 30e265c8-8e74-451e-8208-9eff530f07eb correlation 70cb6f84-4cb7-43c0-8eda-3bcdf0704ac6 created: 2024-07-02T01:51:29.067940Z] Jul 2 01:53:27.617141 waagent[1645]: 2024-07-02T01:53:27.617077Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Jul 2 01:53:27.620387 waagent[1645]: 2024-07-02T01:53:27.620295Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms] Jul 2 01:53:27.643446 waagent[1645]: 2024-07-02T01:53:27.643338Z INFO ExtHandler ExtHandler Looking for existing remote access users. Jul 2 01:53:27.661558 waagent[1645]: 2024-07-02T01:53:27.661462Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.11.1.4 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 0E79F58F-76F7-4691-A8AB-D23675672BF6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Jul 2 01:53:27.824281 waagent[1645]: 2024-07-02T01:53:27.824134Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Jul 2 01:53:27.824281 waagent[1645]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:27.824281 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:53:27.824281 waagent[1645]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:27.824281 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:53:27.824281 waagent[1645]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:27.824281 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:53:27.824281 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:53:27.824281 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:53:27.824281 waagent[1645]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:53:27.832995 waagent[1645]: 2024-07-02T01:53:27.832837Z INFO EnvHandler ExtHandler Current Firewall rules: Jul 2 01:53:27.832995 waagent[1645]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:27.832995 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:53:27.832995 waagent[1645]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:27.832995 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:53:27.832995 waagent[1645]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:27.832995 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:53:27.832995 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:53:27.832995 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:53:27.832995 waagent[1645]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:53:27.833614 waagent[1645]: 2024-07-02T01:53:27.833561Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Jul 2 01:53:28.561330 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 01:53:28.561523 systemd[1]: Stopped kubelet.service. Jul 2 01:53:28.563014 systemd[1]: Starting kubelet.service... Jul 2 01:53:28.670369 systemd[1]: Started kubelet.service. Jul 2 01:53:29.157604 kubelet[1701]: E0702 01:53:29.157538 1701 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:29.160122 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:29.160242 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:30.403274 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Jul 2 01:53:39.311392 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 01:53:39.311573 systemd[1]: Stopped kubelet.service. Jul 2 01:53:39.313007 systemd[1]: Starting kubelet.service... Jul 2 01:53:39.637652 systemd[1]: Started kubelet.service. Jul 2 01:53:39.936274 kubelet[1711]: E0702 01:53:39.936150 1711 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:39.938596 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:39.938730 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:45.540835 update_engine[1434]: I0702 01:53:45.540414 1434 update_attempter.cc:509] Updating boot flags... Jul 2 01:53:50.061443 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 01:53:50.061607 systemd[1]: Stopped kubelet.service. Jul 2 01:53:50.062993 systemd[1]: Starting kubelet.service... Jul 2 01:53:50.396850 systemd[1]: Started kubelet.service. Jul 2 01:53:50.640710 kubelet[1790]: E0702 01:53:50.640649 1790 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:50.643906 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:50.644026 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:54:00.811424 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Jul 2 01:54:00.811601 systemd[1]: Stopped kubelet.service. Jul 2 01:54:00.813014 systemd[1]: Starting kubelet.service... Jul 2 01:54:01.153330 systemd[1]: Started kubelet.service. Jul 2 01:54:01.457957 kubelet[1800]: E0702 01:54:01.457804 1800 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:54:01.460685 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:54:01.460810 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:54:05.993835 systemd[1]: Created slice system-sshd.slice. Jul 2 01:54:05.995538 systemd[1]: Started sshd@0-10.200.20.45:22-10.200.16.10:55006.service. Jul 2 01:54:06.629043 sshd[1807]: Accepted publickey for core from 10.200.16.10 port 55006 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:06.647300 sshd[1807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:06.651430 systemd-logind[1433]: New session 3 of user core. Jul 2 01:54:06.651665 systemd[1]: Started session-3.scope. Jul 2 01:54:07.021022 systemd[1]: Started sshd@1-10.200.20.45:22-10.200.16.10:55022.service. Jul 2 01:54:07.453981 sshd[1812]: Accepted publickey for core from 10.200.16.10 port 55022 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:07.455593 sshd[1812]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:07.459220 systemd-logind[1433]: New session 4 of user core. Jul 2 01:54:07.459736 systemd[1]: Started session-4.scope. Jul 2 01:54:07.788678 sshd[1812]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:07.791225 systemd[1]: sshd@1-10.200.20.45:22-10.200.16.10:55022.service: Deactivated successfully. Jul 2 01:54:07.791982 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 01:54:07.792541 systemd-logind[1433]: Session 4 logged out. Waiting for processes to exit. Jul 2 01:54:07.793537 systemd-logind[1433]: Removed session 4. Jul 2 01:54:07.866508 systemd[1]: Started sshd@2-10.200.20.45:22-10.200.16.10:55038.service. Jul 2 01:54:08.336295 sshd[1818]: Accepted publickey for core from 10.200.16.10 port 55038 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:08.337553 sshd[1818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:08.341324 systemd-logind[1433]: New session 5 of user core. Jul 2 01:54:08.341815 systemd[1]: Started session-5.scope. Jul 2 01:54:08.682912 sshd[1818]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:08.685573 systemd[1]: sshd@2-10.200.20.45:22-10.200.16.10:55038.service: Deactivated successfully. Jul 2 01:54:08.686216 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 01:54:08.686754 systemd-logind[1433]: Session 5 logged out. Waiting for processes to exit. Jul 2 01:54:08.687590 systemd-logind[1433]: Removed session 5. Jul 2 01:54:08.760212 systemd[1]: Started sshd@3-10.200.20.45:22-10.200.16.10:44290.service. Jul 2 01:54:09.223774 sshd[1824]: Accepted publickey for core from 10.200.16.10 port 44290 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:09.225027 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:09.228398 systemd-logind[1433]: New session 6 of user core. Jul 2 01:54:09.229194 systemd[1]: Started session-6.scope. Jul 2 01:54:09.572551 sshd[1824]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:09.575216 systemd[1]: sshd@3-10.200.20.45:22-10.200.16.10:44290.service: Deactivated successfully. Jul 2 01:54:09.575920 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 01:54:09.576463 systemd-logind[1433]: Session 6 logged out. Waiting for processes to exit. Jul 2 01:54:09.577277 systemd-logind[1433]: Removed session 6. Jul 2 01:54:09.644882 systemd[1]: Started sshd@4-10.200.20.45:22-10.200.16.10:44292.service. Jul 2 01:54:10.078137 sshd[1830]: Accepted publickey for core from 10.200.16.10 port 44292 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:10.079745 sshd[1830]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:10.083899 systemd[1]: Started session-7.scope. Jul 2 01:54:10.084482 systemd-logind[1433]: New session 7 of user core. Jul 2 01:54:10.538374 sudo[1833]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 01:54:10.538593 sudo[1833]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:54:10.602546 dbus-daemon[1423]: avc: received setenforce notice (enforcing=1) Jul 2 01:54:10.604312 sudo[1833]: pam_unix(sudo:session): session closed for user root Jul 2 01:54:10.704846 sshd[1830]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:10.708165 systemd[1]: sshd@4-10.200.20.45:22-10.200.16.10:44292.service: Deactivated successfully. Jul 2 01:54:10.708607 systemd-logind[1433]: Session 7 logged out. Waiting for processes to exit. Jul 2 01:54:10.708947 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 01:54:10.709871 systemd-logind[1433]: Removed session 7. Jul 2 01:54:10.782990 systemd[1]: Started sshd@5-10.200.20.45:22-10.200.16.10:44308.service. Jul 2 01:54:11.251704 sshd[1837]: Accepted publickey for core from 10.200.16.10 port 44308 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:11.254033 sshd[1837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:11.258919 systemd[1]: Started session-8.scope. Jul 2 01:54:11.259228 systemd-logind[1433]: New session 8 of user core. Jul 2 01:54:11.518446 sudo[1841]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 01:54:11.518659 sudo[1841]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:54:11.519404 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Jul 2 01:54:11.519604 systemd[1]: Stopped kubelet.service. Jul 2 01:54:11.521008 systemd[1]: Starting kubelet.service... Jul 2 01:54:11.524070 sudo[1841]: pam_unix(sudo:session): session closed for user root Jul 2 01:54:11.529042 sudo[1840]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 01:54:11.529263 sudo[1840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:54:11.538699 systemd[1]: Stopping audit-rules.service... Jul 2 01:54:11.539000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:54:11.544681 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 01:54:11.544735 kernel: audit: type=1305 audit(1719885251.539:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:54:11.554880 auditctl[1846]: No rules Jul 2 01:54:11.555441 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 01:54:11.555612 systemd[1]: Stopped audit-rules.service. Jul 2 01:54:11.557269 systemd[1]: Starting audit-rules.service... Jul 2 01:54:11.539000 audit[1846]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc8f41b70 a2=420 a3=0 items=0 ppid=1 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:11.584062 kernel: audit: type=1300 audit(1719885251.539:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc8f41b70 a2=420 a3=0 items=0 ppid=1 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:11.539000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:54:11.592937 kernel: audit: type=1327 audit(1719885251.539:211): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:54:11.593036 kernel: audit: type=1131 audit(1719885251.554:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.663744 augenrules[1863]: No rules Jul 2 01:54:11.664653 systemd[1]: Finished audit-rules.service. Jul 2 01:54:11.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.666433 sudo[1840]: pam_unix(sudo:session): session closed for user root Jul 2 01:54:11.665000 audit[1840]: USER_END pid=1840 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.698756 kernel: audit: type=1130 audit(1719885251.663:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.698869 kernel: audit: type=1106 audit(1719885251.665:214): pid=1840 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.698909 kernel: audit: type=1104 audit(1719885251.665:215): pid=1840 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.665000 audit[1840]: CRED_DISP pid=1840 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.701547 systemd[1]: Started kubelet.service. Jul 2 01:54:11.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.732463 kernel: audit: type=1130 audit(1719885251.700:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.751589 sshd[1837]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:11.751000 audit[1837]: USER_END pid=1837 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:11.758188 systemd[1]: sshd@5-10.200.20.45:22-10.200.16.10:44308.service: Deactivated successfully. Jul 2 01:54:11.759070 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 01:54:11.760682 systemd-logind[1433]: Session 8 logged out. Waiting for processes to exit. Jul 2 01:54:11.761729 systemd-logind[1433]: Removed session 8. Jul 2 01:54:11.755000 audit[1837]: CRED_DISP pid=1837 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:11.793490 kernel: audit: type=1106 audit(1719885251.751:217): pid=1837 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:11.793636 kernel: audit: type=1104 audit(1719885251.755:218): pid=1837 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:11.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.45:22-10.200.16.10:44308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.797937 kubelet[1869]: E0702 01:54:11.797889 1869 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:54:11.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:54:11.800609 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:54:11.800757 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:54:11.845534 systemd[1]: Started sshd@6-10.200.20.45:22-10.200.16.10:44324.service. Jul 2 01:54:11.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.45:22-10.200.16.10:44324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:12.273000 audit[1877]: USER_ACCT pid=1877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.273984 sshd[1877]: Accepted publickey for core from 10.200.16.10 port 44324 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:12.274000 audit[1877]: CRED_ACQ pid=1877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.274000 audit[1877]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff858b250 a2=3 a3=1 items=0 ppid=1 pid=1877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:12.274000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:12.275605 sshd[1877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:12.279968 systemd[1]: Started session-9.scope. Jul 2 01:54:12.280546 systemd-logind[1433]: New session 9 of user core. Jul 2 01:54:12.284000 audit[1877]: USER_START pid=1877 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.285000 audit[1879]: CRED_ACQ pid=1879 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.520000 audit[1880]: USER_ACCT pid=1880 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:12.520000 audit[1880]: CRED_REFR pid=1880 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:12.520713 sudo[1880]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 01:54:12.521331 sudo[1880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:54:12.522000 audit[1880]: USER_START pid=1880 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:12.534124 systemd[1]: Starting coreos-metadata.service... Jul 2 01:54:12.606563 coreos-metadata[1884]: Jul 02 01:54:12.606 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 01:54:12.609647 coreos-metadata[1884]: Jul 02 01:54:12.609 INFO Fetch successful Jul 2 01:54:12.609830 coreos-metadata[1884]: Jul 02 01:54:12.609 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Jul 2 01:54:12.611569 coreos-metadata[1884]: Jul 02 01:54:12.611 INFO Fetch successful Jul 2 01:54:12.611899 coreos-metadata[1884]: Jul 02 01:54:12.611 INFO Fetching http://168.63.129.16/machine/c8064ae2-736f-4479-9dda-cce53163e352/6a336620%2D5cce%2D4ef9%2Dbab2%2D6bf169097fb5.%5Fci%2D3510.3.5%2Da%2Dbbfd170fa1?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Jul 2 01:54:12.613711 coreos-metadata[1884]: Jul 02 01:54:12.613 INFO Fetch successful Jul 2 01:54:12.648096 coreos-metadata[1884]: Jul 02 01:54:12.647 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Jul 2 01:54:12.659801 coreos-metadata[1884]: Jul 02 01:54:12.659 INFO Fetch successful Jul 2 01:54:12.668506 systemd[1]: Finished coreos-metadata.service. Jul 2 01:54:12.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:15.857687 systemd[1]: Stopped kubelet.service. Jul 2 01:54:15.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:15.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:15.859754 systemd[1]: Starting kubelet.service... Jul 2 01:54:15.883436 systemd[1]: Reloading. Jul 2 01:54:15.958557 /usr/lib/systemd/system-generators/torcx-generator[1943]: time="2024-07-02T01:54:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:54:15.960248 /usr/lib/systemd/system-generators/torcx-generator[1943]: time="2024-07-02T01:54:15Z" level=info msg="torcx already run" Jul 2 01:54:16.050450 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:54:16.050628 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:54:16.066330 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:54:16.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.140000 audit: BPF prog-id=41 op=LOAD Jul 2 01:54:16.140000 audit: BPF prog-id=33 op=UNLOAD Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.141000 audit: BPF prog-id=42 op=LOAD Jul 2 01:54:16.141000 audit: BPF prog-id=24 op=UNLOAD Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit: BPF prog-id=43 op=LOAD Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.143000 audit: BPF prog-id=44 op=LOAD Jul 2 01:54:16.143000 audit: BPF prog-id=25 op=UNLOAD Jul 2 01:54:16.143000 audit: BPF prog-id=26 op=UNLOAD Jul 2 01:54:16.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit: BPF prog-id=45 op=LOAD Jul 2 01:54:16.144000 audit: BPF prog-id=27 op=UNLOAD Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit: BPF prog-id=46 op=LOAD Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.145000 audit: BPF prog-id=47 op=LOAD Jul 2 01:54:16.145000 audit: BPF prog-id=28 op=UNLOAD Jul 2 01:54:16.145000 audit: BPF prog-id=29 op=UNLOAD Jul 2 01:54:16.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.147000 audit: BPF prog-id=48 op=LOAD Jul 2 01:54:16.147000 audit: BPF prog-id=40 op=UNLOAD Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit: BPF prog-id=49 op=LOAD Jul 2 01:54:16.148000 audit: BPF prog-id=35 op=UNLOAD Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit: BPF prog-id=50 op=LOAD Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.148000 audit: BPF prog-id=51 op=LOAD Jul 2 01:54:16.148000 audit: BPF prog-id=36 op=UNLOAD Jul 2 01:54:16.148000 audit: BPF prog-id=37 op=UNLOAD Jul 2 01:54:16.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit: BPF prog-id=52 op=LOAD Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.150000 audit: BPF prog-id=53 op=LOAD Jul 2 01:54:16.150000 audit: BPF prog-id=31 op=UNLOAD Jul 2 01:54:16.150000 audit: BPF prog-id=32 op=UNLOAD Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.152000 audit: BPF prog-id=54 op=LOAD Jul 2 01:54:16.152000 audit: BPF prog-id=38 op=UNLOAD Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:16.153000 audit: BPF prog-id=55 op=LOAD Jul 2 01:54:16.153000 audit: BPF prog-id=34 op=UNLOAD Jul 2 01:54:16.181888 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 2 01:54:16.181972 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 2 01:54:16.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:54:16.182180 systemd[1]: Stopped kubelet.service. Jul 2 01:54:16.183910 systemd[1]: Starting kubelet.service... Jul 2 01:54:16.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:16.936604 systemd[1]: Started kubelet.service. Jul 2 01:54:16.942583 kernel: kauditd_printk_skb: 189 callbacks suppressed Jul 2 01:54:16.942692 kernel: audit: type=1130 audit(1719885256.935:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:17.209084 kubelet[2006]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:54:17.209434 kubelet[2006]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 01:54:17.209493 kubelet[2006]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:54:17.209647 kubelet[2006]: I0702 01:54:17.209613 2006 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 01:54:17.958797 kubelet[2006]: I0702 01:54:17.958760 2006 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 01:54:17.958797 kubelet[2006]: I0702 01:54:17.958792 2006 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 01:54:17.959003 kubelet[2006]: I0702 01:54:17.958995 2006 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 01:54:17.971656 kubelet[2006]: I0702 01:54:17.971617 2006 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 01:54:17.985890 kubelet[2006]: I0702 01:54:17.985864 2006 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 01:54:17.987642 kubelet[2006]: I0702 01:54:17.987620 2006 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 01:54:17.987962 kubelet[2006]: I0702 01:54:17.987942 2006 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 01:54:17.988098 kubelet[2006]: I0702 01:54:17.988087 2006 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 01:54:17.988157 kubelet[2006]: I0702 01:54:17.988148 2006 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 01:54:17.988334 kubelet[2006]: I0702 01:54:17.988320 2006 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:54:17.991549 kubelet[2006]: I0702 01:54:17.991527 2006 kubelet.go:396] "Attempting to sync node with API server" Jul 2 01:54:17.991646 kubelet[2006]: I0702 01:54:17.991636 2006 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 01:54:17.991728 kubelet[2006]: I0702 01:54:17.991718 2006 kubelet.go:312] "Adding apiserver pod source" Jul 2 01:54:17.991787 kubelet[2006]: I0702 01:54:17.991778 2006 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 01:54:17.991936 kubelet[2006]: E0702 01:54:17.991906 2006 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:17.991974 kubelet[2006]: E0702 01:54:17.991951 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:17.992999 kubelet[2006]: I0702 01:54:17.992974 2006 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 01:54:17.993279 kubelet[2006]: I0702 01:54:17.993257 2006 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 01:54:17.993325 kubelet[2006]: W0702 01:54:17.993312 2006 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 01:54:17.993834 kubelet[2006]: I0702 01:54:17.993811 2006 server.go:1256] "Started kubelet" Jul 2 01:54:17.994204 kubelet[2006]: I0702 01:54:17.994185 2006 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 01:54:17.995074 kubelet[2006]: I0702 01:54:17.995054 2006 server.go:461] "Adding debug handlers to kubelet server" Jul 2 01:54:17.996000 audit[2006]: AVC avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:17.998448 kubelet[2006]: I0702 01:54:17.998426 2006 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 01:54:17.998577 kubelet[2006]: I0702 01:54:17.998561 2006 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 01:54:17.996000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:54:18.022227 kernel: audit: type=1400 audit(1719885257.996:407): avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:18.022320 kernel: audit: type=1401 audit(1719885257.996:407): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:54:18.022339 kernel: audit: type=1300 audit(1719885257.996:407): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000875290 a1=4000660f60 a2=4000875260 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:17.996000 audit[2006]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000875290 a1=4000660f60 a2=4000875260 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:17.996000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:54:18.045923 kubelet[2006]: I0702 01:54:18.045899 2006 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 01:54:18.046290 kubelet[2006]: I0702 01:54:18.046275 2006 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 01:54:18.069525 kernel: audit: type=1327 audit(1719885257.996:407): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:54:18.069678 kernel: audit: type=1400 audit(1719885257.998:408): avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:17.998000 audit[2006]: AVC avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:18.071321 kubelet[2006]: I0702 01:54:18.071293 2006 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 01:54:18.076449 kubelet[2006]: I0702 01:54:18.076421 2006 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 01:54:18.078869 kubelet[2006]: I0702 01:54:18.078843 2006 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 01:54:18.079095 kubelet[2006]: I0702 01:54:18.079084 2006 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 01:54:17.998000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:54:18.097520 kernel: audit: type=1401 audit(1719885257.998:408): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:54:18.097732 kernel: audit: type=1300 audit(1719885257.998:408): arch=c00000b7 syscall=5 success=no exit=-22 a0=400002b6e0 a1=4000660f78 a2=4000875320 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:17.998000 audit[2006]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400002b6e0 a1=4000660f78 a2=4000875320 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:17.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:54:18.127350 kubelet[2006]: I0702 01:54:18.127315 2006 factory.go:221] Registration of the systemd container factory successfully Jul 2 01:54:18.127655 kubelet[2006]: I0702 01:54:18.127635 2006 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 01:54:18.148007 kernel: audit: type=1327 audit(1719885257.998:408): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:54:18.148370 kernel: audit: type=1325 audit(1719885258.073:409): table=mangle:5 family=2 entries=2 op=nft_register_chain pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.073000 audit[2016]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.073000 audit[2016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff9c65860 a2=0 a3=1 items=0 ppid=2006 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:54:18.074000 audit[2017]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=2017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.074000 audit[2017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff6dd0890 a2=0 a3=1 items=0 ppid=2006 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:54:18.077000 audit[2019]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=2019 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.077000 audit[2019]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc3401860 a2=0 a3=1 items=0 ppid=2006 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:54:18.079000 audit[2021]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=2021 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.079000 audit[2021]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd79b71a0 a2=0 a3=1 items=0 ppid=2006 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:54:18.168933 kubelet[2006]: E0702 01:54:18.168909 2006 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 01:54:18.169841 kubelet[2006]: E0702 01:54:18.169819 2006 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.45\" not found" node="10.200.20.45" Jul 2 01:54:18.174895 kubelet[2006]: I0702 01:54:18.174868 2006 factory.go:221] Registration of the containerd container factory successfully Jul 2 01:54:18.180604 kubelet[2006]: E0702 01:54:18.180577 2006 container_manager_linux.go:881] "Unable to get rootfs data from cAdvisor interface" err="unable to find data in memory cache" Jul 2 01:54:18.181496 kubelet[2006]: I0702 01:54:18.181478 2006 kubelet_node_status.go:73] "Attempting to register node" node="10.200.20.45" Jul 2 01:54:18.182000 audit[2026]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2026 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.182000 audit[2026]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffee1703a0 a2=0 a3=1 items=0 ppid=2006 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 01:54:18.183253 kubelet[2006]: I0702 01:54:18.183239 2006 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 01:54:18.183000 audit[2027]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=2027 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:18.183000 audit[2027]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd39d19f0 a2=0 a3=1 items=0 ppid=2006 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:54:18.184412 kubelet[2006]: I0702 01:54:18.184397 2006 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 01:54:18.184494 kubelet[2006]: I0702 01:54:18.184484 2006 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 01:54:18.184555 kubelet[2006]: I0702 01:54:18.184546 2006 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 01:54:18.184719 kubelet[2006]: E0702 01:54:18.184708 2006 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 01:54:18.185000 audit[2028]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=2028 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.185000 audit[2028]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1958480 a2=0 a3=1 items=0 ppid=2006 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:54:18.186000 audit[2029]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=2029 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.186000 audit[2029]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffb1dbb90 a2=0 a3=1 items=0 ppid=2006 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:54:18.187000 audit[2030]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2030 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:18.187000 audit[2030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffe8f8cc0 a2=0 a3=1 items=0 ppid=2006 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:54:18.187000 audit[2031]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2031 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:18.187000 audit[2031]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcff75140 a2=0 a3=1 items=0 ppid=2006 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:54:18.188000 audit[2032]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=2032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:18.188000 audit[2032]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd8869740 a2=0 a3=1 items=0 ppid=2006 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:54:18.189000 audit[2033]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:18.189000 audit[2033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeb1a9990 a2=0 a3=1 items=0 ppid=2006 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:54:18.191849 kubelet[2006]: I0702 01:54:18.191828 2006 kubelet_node_status.go:76] "Successfully registered node" node="10.200.20.45" Jul 2 01:54:18.197044 kubelet[2006]: I0702 01:54:18.197011 2006 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 01:54:18.197044 kubelet[2006]: I0702 01:54:18.197035 2006 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 01:54:18.197164 kubelet[2006]: I0702 01:54:18.197055 2006 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:54:18.203184 kubelet[2006]: I0702 01:54:18.203156 2006 policy_none.go:49] "None policy: Start" Jul 2 01:54:18.204159 kubelet[2006]: I0702 01:54:18.204094 2006 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 01:54:18.204253 kubelet[2006]: I0702 01:54:18.204180 2006 state_mem.go:35] "Initializing new in-memory state store" Jul 2 01:54:18.211492 systemd[1]: Created slice kubepods.slice. Jul 2 01:54:18.217227 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 01:54:18.220226 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 01:54:18.228215 kubelet[2006]: I0702 01:54:18.228178 2006 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 01:54:18.227000 audit[2006]: AVC avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:18.227000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:54:18.227000 audit[2006]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ec97d0 a1=4000ef7140 a2=4000ec97a0 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:54:18.228692 kubelet[2006]: I0702 01:54:18.228271 2006 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 01:54:18.229859 kubelet[2006]: I0702 01:54:18.229337 2006 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 01:54:18.231436 kubelet[2006]: I0702 01:54:18.231409 2006 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 01:54:18.232293 env[1447]: time="2024-07-02T01:54:18.232154977Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 01:54:18.233121 kubelet[2006]: I0702 01:54:18.232923 2006 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 01:54:18.961358 kubelet[2006]: I0702 01:54:18.961318 2006 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 01:54:18.961792 kubelet[2006]: W0702 01:54:18.961764 2006 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Jul 2 01:54:18.961836 kubelet[2006]: W0702 01:54:18.961814 2006 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Jul 2 01:54:18.961859 kubelet[2006]: W0702 01:54:18.961836 2006 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Jul 2 01:54:18.992634 kubelet[2006]: E0702 01:54:18.992600 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:18.992761 kubelet[2006]: I0702 01:54:18.992600 2006 apiserver.go:52] "Watching apiserver" Jul 2 01:54:18.996942 kubelet[2006]: I0702 01:54:18.996893 2006 topology_manager.go:215] "Topology Admit Handler" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" podNamespace="calico-system" podName="csi-node-driver-c9nvw" Jul 2 01:54:18.997074 kubelet[2006]: I0702 01:54:18.996994 2006 topology_manager.go:215] "Topology Admit Handler" podUID="50916eb7-4241-463f-acbd-a31d99e93b49" podNamespace="kube-system" podName="kube-proxy-bnqr2" Jul 2 01:54:18.997074 kubelet[2006]: I0702 01:54:18.997053 2006 topology_manager.go:215] "Topology Admit Handler" podUID="34505c16-068b-445f-b652-18b76f2bda8d" podNamespace="calico-system" podName="calico-node-s6xzr" Jul 2 01:54:18.997850 kubelet[2006]: E0702 01:54:18.997813 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:19.001832 systemd[1]: Created slice kubepods-besteffort-pod34505c16_068b_445f_b652_18b76f2bda8d.slice. Jul 2 01:54:19.012724 systemd[1]: Created slice kubepods-besteffort-pod50916eb7_4241_463f_acbd_a31d99e93b49.slice. Jul 2 01:54:19.080120 kubelet[2006]: I0702 01:54:19.080077 2006 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 01:54:19.084001 kubelet[2006]: I0702 01:54:19.083981 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b7npr\" (UniqueName: \"kubernetes.io/projected/b7a3fb05-270a-4240-bc71-3514410bb228-kube-api-access-b7npr\") pod \"csi-node-driver-c9nvw\" (UID: \"b7a3fb05-270a-4240-bc71-3514410bb228\") " pod="calico-system/csi-node-driver-c9nvw" Jul 2 01:54:19.084138 kubelet[2006]: I0702 01:54:19.084125 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-cni-bin-dir\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.084239 kubelet[2006]: I0702 01:54:19.084228 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-cni-net-dir\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.084350 kubelet[2006]: I0702 01:54:19.084339 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b7a3fb05-270a-4240-bc71-3514410bb228-varrun\") pod \"csi-node-driver-c9nvw\" (UID: \"b7a3fb05-270a-4240-bc71-3514410bb228\") " pod="calico-system/csi-node-driver-c9nvw" Jul 2 01:54:19.084459 kubelet[2006]: I0702 01:54:19.084449 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b7a3fb05-270a-4240-bc71-3514410bb228-registration-dir\") pod \"csi-node-driver-c9nvw\" (UID: \"b7a3fb05-270a-4240-bc71-3514410bb228\") " pod="calico-system/csi-node-driver-c9nvw" Jul 2 01:54:19.084568 kubelet[2006]: I0702 01:54:19.084557 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/50916eb7-4241-463f-acbd-a31d99e93b49-lib-modules\") pod \"kube-proxy-bnqr2\" (UID: \"50916eb7-4241-463f-acbd-a31d99e93b49\") " pod="kube-system/kube-proxy-bnqr2" Jul 2 01:54:19.084663 kubelet[2006]: I0702 01:54:19.084653 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-lib-modules\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.084759 kubelet[2006]: I0702 01:54:19.084749 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-xtables-lock\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.084855 kubelet[2006]: I0702 01:54:19.084845 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-cni-log-dir\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.084957 kubelet[2006]: I0702 01:54:19.084947 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b7a3fb05-270a-4240-bc71-3514410bb228-socket-dir\") pod \"csi-node-driver-c9nvw\" (UID: \"b7a3fb05-270a-4240-bc71-3514410bb228\") " pod="calico-system/csi-node-driver-c9nvw" Jul 2 01:54:19.085062 kubelet[2006]: I0702 01:54:19.085051 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d22px\" (UniqueName: \"kubernetes.io/projected/50916eb7-4241-463f-acbd-a31d99e93b49-kube-api-access-d22px\") pod \"kube-proxy-bnqr2\" (UID: \"50916eb7-4241-463f-acbd-a31d99e93b49\") " pod="kube-system/kube-proxy-bnqr2" Jul 2 01:54:19.085160 kubelet[2006]: I0702 01:54:19.085150 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/50916eb7-4241-463f-acbd-a31d99e93b49-xtables-lock\") pod \"kube-proxy-bnqr2\" (UID: \"50916eb7-4241-463f-acbd-a31d99e93b49\") " pod="kube-system/kube-proxy-bnqr2" Jul 2 01:54:19.085268 kubelet[2006]: I0702 01:54:19.085257 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-policysync\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.085389 kubelet[2006]: I0702 01:54:19.085378 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/34505c16-068b-445f-b652-18b76f2bda8d-tigera-ca-bundle\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.085501 kubelet[2006]: I0702 01:54:19.085491 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/34505c16-068b-445f-b652-18b76f2bda8d-node-certs\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.085594 kubelet[2006]: I0702 01:54:19.085584 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-var-run-calico\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.085722 kubelet[2006]: I0702 01:54:19.085697 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-var-lib-calico\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.085766 kubelet[2006]: I0702 01:54:19.085732 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b7a3fb05-270a-4240-bc71-3514410bb228-kubelet-dir\") pod \"csi-node-driver-c9nvw\" (UID: \"b7a3fb05-270a-4240-bc71-3514410bb228\") " pod="calico-system/csi-node-driver-c9nvw" Jul 2 01:54:19.085766 kubelet[2006]: I0702 01:54:19.085752 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/50916eb7-4241-463f-acbd-a31d99e93b49-kube-proxy\") pod \"kube-proxy-bnqr2\" (UID: \"50916eb7-4241-463f-acbd-a31d99e93b49\") " pod="kube-system/kube-proxy-bnqr2" Jul 2 01:54:19.085813 kubelet[2006]: I0702 01:54:19.085773 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/34505c16-068b-445f-b652-18b76f2bda8d-flexvol-driver-host\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.085813 kubelet[2006]: I0702 01:54:19.085792 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q4jxb\" (UniqueName: \"kubernetes.io/projected/34505c16-068b-445f-b652-18b76f2bda8d-kube-api-access-q4jxb\") pod \"calico-node-s6xzr\" (UID: \"34505c16-068b-445f-b652-18b76f2bda8d\") " pod="calico-system/calico-node-s6xzr" Jul 2 01:54:19.195891 kubelet[2006]: E0702 01:54:19.195866 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:54:19.196050 kubelet[2006]: W0702 01:54:19.196035 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:54:19.196133 kubelet[2006]: E0702 01:54:19.196120 2006 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:54:19.210086 kubelet[2006]: E0702 01:54:19.210045 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:54:19.210086 kubelet[2006]: W0702 01:54:19.210075 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:54:19.210241 kubelet[2006]: E0702 01:54:19.210099 2006 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:54:19.210313 kubelet[2006]: E0702 01:54:19.210291 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:54:19.210313 kubelet[2006]: W0702 01:54:19.210305 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:54:19.210427 kubelet[2006]: E0702 01:54:19.210316 2006 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:54:19.216301 kubelet[2006]: E0702 01:54:19.216220 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:54:19.216301 kubelet[2006]: W0702 01:54:19.216241 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:54:19.216301 kubelet[2006]: E0702 01:54:19.216260 2006 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:54:19.311939 env[1447]: time="2024-07-02T01:54:19.311700473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s6xzr,Uid:34505c16-068b-445f-b652-18b76f2bda8d,Namespace:calico-system,Attempt:0,}" Jul 2 01:54:19.315917 env[1447]: time="2024-07-02T01:54:19.315882118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bnqr2,Uid:50916eb7-4241-463f-acbd-a31d99e93b49,Namespace:kube-system,Attempt:0,}" Jul 2 01:54:19.479000 audit[1880]: USER_END pid=1880 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:19.479000 audit[1880]: CRED_DISP pid=1880 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:54:19.480923 sudo[1880]: pam_unix(sudo:session): session closed for user root Jul 2 01:54:19.566458 sshd[1877]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:19.565000 audit[1877]: USER_END pid=1877 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:19.566000 audit[1877]: CRED_DISP pid=1877 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:19.568632 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 01:54:19.569340 systemd[1]: sshd@6-10.200.20.45:22-10.200.16.10:44324.service: Deactivated successfully. Jul 2 01:54:19.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.45:22-10.200.16.10:44324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:19.570450 systemd-logind[1433]: Session 9 logged out. Waiting for processes to exit. Jul 2 01:54:19.571102 systemd-logind[1433]: Removed session 9. Jul 2 01:54:19.993294 kubelet[2006]: E0702 01:54:19.993259 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:20.493896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2731366296.mount: Deactivated successfully. Jul 2 01:54:20.511300 env[1447]: time="2024-07-02T01:54:20.511252490Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.519403 env[1447]: time="2024-07-02T01:54:20.519317737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.522524 env[1447]: time="2024-07-02T01:54:20.522490803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.526778 env[1447]: time="2024-07-02T01:54:20.526735040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.530228 env[1447]: time="2024-07-02T01:54:20.530187590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.532778 env[1447]: time="2024-07-02T01:54:20.532748318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.536316 env[1447]: time="2024-07-02T01:54:20.536274481Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.542375 env[1447]: time="2024-07-02T01:54:20.542325966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:20.588628 env[1447]: time="2024-07-02T01:54:20.588554338Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:54:20.588747 env[1447]: time="2024-07-02T01:54:20.588633551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:54:20.588747 env[1447]: time="2024-07-02T01:54:20.588682638Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:54:20.588917 env[1447]: time="2024-07-02T01:54:20.588869188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7742efac77a7f777e6fbb51b3cf920c45e1495a3a657bcaf52ce4c30f77ed5f pid=2052 runtime=io.containerd.runc.v2 Jul 2 01:54:20.593171 env[1447]: time="2024-07-02T01:54:20.593086101Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:54:20.593171 env[1447]: time="2024-07-02T01:54:20.593127227Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:54:20.593171 env[1447]: time="2024-07-02T01:54:20.593138029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:54:20.593526 env[1447]: time="2024-07-02T01:54:20.593474443Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453 pid=2064 runtime=io.containerd.runc.v2 Jul 2 01:54:20.606635 systemd[1]: Started cri-containerd-bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453.scope. Jul 2 01:54:20.613369 systemd[1]: Started cri-containerd-e7742efac77a7f777e6fbb51b3cf920c45e1495a3a657bcaf52ce4c30f77ed5f.scope. Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit: BPF prog-id=56 op=LOAD Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2064 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313732353033333135663832336363616639353335306338616634 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2064 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313732353033333135663832336363616639353335306338616634 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.621000 audit: BPF prog-id=57 op=LOAD Jul 2 01:54:20.621000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2064 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313732353033333135663832336363616639353335306338616634 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit: BPF prog-id=58 op=LOAD Jul 2 01:54:20.622000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2064 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313732353033333135663832336363616639353335306338616634 Jul 2 01:54:20.622000 audit: BPF prog-id=58 op=UNLOAD Jul 2 01:54:20.622000 audit: BPF prog-id=57 op=UNLOAD Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.622000 audit: BPF prog-id=59 op=LOAD Jul 2 01:54:20.622000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2064 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313732353033333135663832336363616639353335306338616634 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.635000 audit: BPF prog-id=60 op=LOAD Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000117b38 a2=10 a3=0 items=0 ppid=2052 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373432656661633737613766373737653666626235316233636639 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001175a0 a2=3c a3=0 items=0 ppid=2052 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373432656661633737613766373737653666626235316233636639 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.636000 audit: BPF prog-id=61 op=LOAD Jul 2 01:54:20.636000 audit[2073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001178e0 a2=78 a3=0 items=0 ppid=2052 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373432656661633737613766373737653666626235316233636639 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.637000 audit: BPF prog-id=62 op=LOAD Jul 2 01:54:20.637000 audit[2073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000117670 a2=78 a3=0 items=0 ppid=2052 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373432656661633737613766373737653666626235316233636639 Jul 2 01:54:20.637000 audit: BPF prog-id=62 op=UNLOAD Jul 2 01:54:20.638000 audit: BPF prog-id=61 op=UNLOAD Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { perfmon } for pid=2073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit[2073]: AVC avc: denied { bpf } for pid=2073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:20.638000 audit: BPF prog-id=63 op=LOAD Jul 2 01:54:20.638000 audit[2073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000117b40 a2=78 a3=0 items=0 ppid=2052 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373432656661633737613766373737653666626235316233636639 Jul 2 01:54:20.640970 env[1447]: time="2024-07-02T01:54:20.640932291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s6xzr,Uid:34505c16-068b-445f-b652-18b76f2bda8d,Namespace:calico-system,Attempt:0,} returns sandbox id \"bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453\"" Jul 2 01:54:20.644797 env[1447]: time="2024-07-02T01:54:20.644748539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 01:54:20.655148 env[1447]: time="2024-07-02T01:54:20.655109032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bnqr2,Uid:50916eb7-4241-463f-acbd-a31d99e93b49,Namespace:kube-system,Attempt:0,} returns sandbox id \"e7742efac77a7f777e6fbb51b3cf920c45e1495a3a657bcaf52ce4c30f77ed5f\"" Jul 2 01:54:20.994379 kubelet[2006]: E0702 01:54:20.994336 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:21.185946 kubelet[2006]: E0702 01:54:21.185906 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:21.679263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1908657433.mount: Deactivated successfully. Jul 2 01:54:21.817743 env[1447]: time="2024-07-02T01:54:21.817693425Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:21.822256 env[1447]: time="2024-07-02T01:54:21.822213447Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:21.825466 env[1447]: time="2024-07-02T01:54:21.825426025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:21.828236 env[1447]: time="2024-07-02T01:54:21.828194775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:21.828657 env[1447]: time="2024-07-02T01:54:21.828620361Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 01:54:21.830160 env[1447]: time="2024-07-02T01:54:21.830125635Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 01:54:21.832348 env[1447]: time="2024-07-02T01:54:21.832305053Z" level=info msg="CreateContainer within sandbox \"bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 01:54:21.858219 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount319970430.mount: Deactivated successfully. Jul 2 01:54:21.872398 env[1447]: time="2024-07-02T01:54:21.872314982Z" level=info msg="CreateContainer within sandbox \"bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b9e49a4c7afe0b18faf35f54543eec9a902401091308b474a7501d73895c784e\"" Jul 2 01:54:21.873708 env[1447]: time="2024-07-02T01:54:21.873664112Z" level=info msg="StartContainer for \"b9e49a4c7afe0b18faf35f54543eec9a902401091308b474a7501d73895c784e\"" Jul 2 01:54:21.890903 systemd[1]: Started cri-containerd-b9e49a4c7afe0b18faf35f54543eec9a902401091308b474a7501d73895c784e.scope. Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2064 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653439613463376166653062313866616633356635343534336565 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit: BPF prog-id=64 op=LOAD Jul 2 01:54:21.907000 audit[2138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2064 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653439613463376166653062313866616633356635343534336565 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit: BPF prog-id=65 op=LOAD Jul 2 01:54:21.907000 audit[2138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2064 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653439613463376166653062313866616633356635343534336565 Jul 2 01:54:21.907000 audit: BPF prog-id=65 op=UNLOAD Jul 2 01:54:21.907000 audit: BPF prog-id=64 op=UNLOAD Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.907000 audit: BPF prog-id=66 op=LOAD Jul 2 01:54:21.907000 audit[2138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2064 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653439613463376166653062313866616633356635343534336565 Jul 2 01:54:21.932248 env[1447]: time="2024-07-02T01:54:21.930742810Z" level=info msg="StartContainer for \"b9e49a4c7afe0b18faf35f54543eec9a902401091308b474a7501d73895c784e\" returns successfully" Jul 2 01:54:21.934061 systemd[1]: cri-containerd-b9e49a4c7afe0b18faf35f54543eec9a902401091308b474a7501d73895c784e.scope: Deactivated successfully. Jul 2 01:54:21.938000 audit: BPF prog-id=66 op=UNLOAD Jul 2 01:54:21.945382 kernel: kauditd_printk_skb: 201 callbacks suppressed Jul 2 01:54:21.945503 kernel: audit: type=1334 audit(1719885261.938:469): prog-id=66 op=UNLOAD Jul 2 01:54:21.995270 kubelet[2006]: E0702 01:54:21.995206 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:22.158313 env[1447]: time="2024-07-02T01:54:22.158269993Z" level=info msg="shim disconnected" id=b9e49a4c7afe0b18faf35f54543eec9a902401091308b474a7501d73895c784e Jul 2 01:54:22.158519 env[1447]: time="2024-07-02T01:54:22.158501348Z" level=warning msg="cleaning up after shim disconnected" id=b9e49a4c7afe0b18faf35f54543eec9a902401091308b474a7501d73895c784e namespace=k8s.io Jul 2 01:54:22.158578 env[1447]: time="2024-07-02T01:54:22.158566118Z" level=info msg="cleaning up dead shim" Jul 2 01:54:22.166899 env[1447]: time="2024-07-02T01:54:22.166836127Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:54:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2176 runtime=io.containerd.runc.v2\n" Jul 2 01:54:22.995972 kubelet[2006]: E0702 01:54:22.995902 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:23.106067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3126916460.mount: Deactivated successfully. Jul 2 01:54:23.185125 kubelet[2006]: E0702 01:54:23.185075 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:23.547113 env[1447]: time="2024-07-02T01:54:23.547043677Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:23.551201 env[1447]: time="2024-07-02T01:54:23.551164003Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a75156450625cf630b7b9b1e8b7d881969131638181257d0d67db0876a25b32f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:23.554918 env[1447]: time="2024-07-02T01:54:23.554868587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:23.558673 env[1447]: time="2024-07-02T01:54:23.558625340Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:23.559269 env[1447]: time="2024-07-02T01:54:23.559240190Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:a75156450625cf630b7b9b1e8b7d881969131638181257d0d67db0876a25b32f\"" Jul 2 01:54:23.560308 env[1447]: time="2024-07-02T01:54:23.560277183Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 01:54:23.561829 env[1447]: time="2024-07-02T01:54:23.561798527Z" level=info msg="CreateContainer within sandbox \"e7742efac77a7f777e6fbb51b3cf920c45e1495a3a657bcaf52ce4c30f77ed5f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 01:54:23.584591 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount97048001.mount: Deactivated successfully. Jul 2 01:54:23.590101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1866886403.mount: Deactivated successfully. Jul 2 01:54:23.602185 env[1447]: time="2024-07-02T01:54:23.602122176Z" level=info msg="CreateContainer within sandbox \"e7742efac77a7f777e6fbb51b3cf920c45e1495a3a657bcaf52ce4c30f77ed5f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3abf65c82910503bad82a53b94bd1feab6eca16a30406ae56d93cf6529fc09b7\"" Jul 2 01:54:23.603150 env[1447]: time="2024-07-02T01:54:23.603119363Z" level=info msg="StartContainer for \"3abf65c82910503bad82a53b94bd1feab6eca16a30406ae56d93cf6529fc09b7\"" Jul 2 01:54:23.622184 systemd[1]: Started cri-containerd-3abf65c82910503bad82a53b94bd1feab6eca16a30406ae56d93cf6529fc09b7.scope. Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2052 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.679312 kernel: audit: type=1400 audit(1719885263.636:470): avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679475 kernel: audit: type=1300 audit(1719885263.636:470): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2052 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361626636356338323931303530336261643832613533623934626431 Jul 2 01:54:23.704550 kernel: audit: type=1327 audit(1719885263.636:470): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361626636356338323931303530336261643832613533623934626431 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.722078 kernel: audit: type=1400 audit(1719885263.636:471): avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.722414 kernel: audit: type=1400 audit(1719885263.636:471): avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.757897 kernel: audit: type=1400 audit(1719885263.636:471): avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.775295 kernel: audit: type=1400 audit(1719885263.636:471): avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.795145 kernel: audit: type=1400 audit(1719885263.636:471): avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.814929 kernel: audit: type=1400 audit(1719885263.636:471): avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.636000 audit: BPF prog-id=67 op=LOAD Jul 2 01:54:23.636000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2052 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361626636356338323931303530336261643832613533623934626431 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.654000 audit: BPF prog-id=68 op=LOAD Jul 2 01:54:23.654000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2052 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361626636356338323931303530336261643832613533623934626431 Jul 2 01:54:23.679000 audit: BPF prog-id=68 op=UNLOAD Jul 2 01:54:23.679000 audit: BPF prog-id=67 op=UNLOAD Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.816418 env[1447]: time="2024-07-02T01:54:23.816335757Z" level=info msg="StartContainer for \"3abf65c82910503bad82a53b94bd1feab6eca16a30406ae56d93cf6529fc09b7\" returns successfully" Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:23.679000 audit: BPF prog-id=69 op=LOAD Jul 2 01:54:23.679000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2052 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361626636356338323931303530336261643832613533623934626431 Jul 2 01:54:23.891000 audit[2248]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:23.891000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5c9a430 a2=0 a3=1 items=0 ppid=2210 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:54:23.892000 audit[2249]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:23.892000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce762ee0 a2=0 a3=1 items=0 ppid=2210 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:54:23.892000 audit[2250]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:23.892000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd922c2f0 a2=0 a3=1 items=0 ppid=2210 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:54:23.894000 audit[2252]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:23.894000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffedd90130 a2=0 a3=1 items=0 ppid=2210 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:54:23.896000 audit[2251]: NETFILTER_CFG table=nat:21 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:23.896000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffdbb1940 a2=0 a3=1 items=0 ppid=2210 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:54:23.898000 audit[2253]: NETFILTER_CFG table=filter:22 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:23.898000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7730e40 a2=0 a3=1 items=0 ppid=2210 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:54:23.996930 kubelet[2006]: E0702 01:54:23.996871 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:23.997000 audit[2254]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:23.997000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdb606200 a2=0 a3=1 items=0 ppid=2210 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:23.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:54:24.000000 audit[2256]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.000000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff92880e0 a2=0 a3=1 items=0 ppid=2210 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 01:54:24.003000 audit[2259]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.003000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffced7f900 a2=0 a3=1 items=0 ppid=2210 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 01:54:24.004000 audit[2260]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.004000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb8bfe70 a2=0 a3=1 items=0 ppid=2210 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:54:24.007000 audit[2262]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.007000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe607c5d0 a2=0 a3=1 items=0 ppid=2210 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:54:24.008000 audit[2263]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.008000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd13186f0 a2=0 a3=1 items=0 ppid=2210 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:54:24.010000 audit[2265]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.010000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff4b62e10 a2=0 a3=1 items=0 ppid=2210 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:54:24.014000 audit[2268]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.014000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff5d7f170 a2=0 a3=1 items=0 ppid=2210 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 01:54:24.015000 audit[2269]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.015000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea5d1980 a2=0 a3=1 items=0 ppid=2210 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:54:24.017000 audit[2271]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.017000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff71e4af0 a2=0 a3=1 items=0 ppid=2210 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:54:24.018000 audit[2272]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.018000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb5c09d0 a2=0 a3=1 items=0 ppid=2210 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:54:24.020000 audit[2274]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.020000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf2b8c60 a2=0 a3=1 items=0 ppid=2210 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:54:24.023000 audit[2277]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.023000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff19c5580 a2=0 a3=1 items=0 ppid=2210 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:54:24.027000 audit[2280]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.027000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8944380 a2=0 a3=1 items=0 ppid=2210 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:54:24.028000 audit[2281]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.028000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd149ad70 a2=0 a3=1 items=0 ppid=2210 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:54:24.030000 audit[2283]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.030000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdad93600 a2=0 a3=1 items=0 ppid=2210 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:24.082000 audit[2288]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.082000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd80f5dc0 a2=0 a3=1 items=0 ppid=2210 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:24.083000 audit[2289]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.083000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2227440 a2=0 a3=1 items=0 ppid=2210 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:54:24.085000 audit[2291]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:24.085000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe3cb27b0 a2=0 a3=1 items=0 ppid=2210 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:54:24.110000 audit[2297]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:24.110000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd1bf0e70 a2=0 a3=1 items=0 ppid=2210 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:24.190000 audit[2297]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:24.190000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffd1bf0e70 a2=0 a3=1 items=0 ppid=2210 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:24.217763 kubelet[2006]: I0702 01:54:24.217732 2006 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-bnqr2" podStartSLOduration=3.314811499 podStartE2EDuration="6.217659449s" podCreationTimestamp="2024-07-02 01:54:18 +0000 UTC" firstStartedPulling="2024-07-02 01:54:20.656717448 +0000 UTC m=+3.697775265" lastFinishedPulling="2024-07-02 01:54:23.559565398 +0000 UTC m=+6.600623215" observedRunningTime="2024-07-02 01:54:24.217605281 +0000 UTC m=+7.258663098" watchObservedRunningTime="2024-07-02 01:54:24.217659449 +0000 UTC m=+7.258717226" Jul 2 01:54:24.220000 audit[2305]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.220000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc2eb6980 a2=0 a3=1 items=0 ppid=2210 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:54:24.223000 audit[2307]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.223000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff69dd250 a2=0 a3=1 items=0 ppid=2210 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 01:54:24.227000 audit[2310]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.227000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc31792f0 a2=0 a3=1 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 01:54:24.228000 audit[2311]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.228000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef704070 a2=0 a3=1 items=0 ppid=2210 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:54:24.230000 audit[2313]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.230000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4eb5350 a2=0 a3=1 items=0 ppid=2210 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:54:24.231000 audit[2314]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.231000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcff39c00 a2=0 a3=1 items=0 ppid=2210 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:54:24.234000 audit[2316]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.234000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffce373690 a2=0 a3=1 items=0 ppid=2210 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 01:54:24.237000 audit[2319]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.237000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff0bba9a0 a2=0 a3=1 items=0 ppid=2210 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:54:24.238000 audit[2320]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.238000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb4bfe10 a2=0 a3=1 items=0 ppid=2210 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:54:24.241000 audit[2322]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.241000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdaa43990 a2=0 a3=1 items=0 ppid=2210 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:54:24.242000 audit[2323]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.242000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7df0ba0 a2=0 a3=1 items=0 ppid=2210 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:54:24.245000 audit[2325]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.245000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff1759b00 a2=0 a3=1 items=0 ppid=2210 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:54:24.248000 audit[2328]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.248000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcdb3c860 a2=0 a3=1 items=0 ppid=2210 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:54:24.252000 audit[2331]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.252000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff8e4d860 a2=0 a3=1 items=0 ppid=2210 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 01:54:24.253000 audit[2332]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.253000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd685d0d0 a2=0 a3=1 items=0 ppid=2210 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:54:24.256000 audit[2334]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.256000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffca7ec500 a2=0 a3=1 items=0 ppid=2210 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:24.259000 audit[2337]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.259000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcc0c9f10 a2=0 a3=1 items=0 ppid=2210 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:24.260000 audit[2338]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.260000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcff464d0 a2=0 a3=1 items=0 ppid=2210 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:54:24.262000 audit[2340]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.262000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe7d27720 a2=0 a3=1 items=0 ppid=2210 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:54:24.264000 audit[2341]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.264000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd64ef70 a2=0 a3=1 items=0 ppid=2210 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:54:24.266000 audit[2343]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.266000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc27c7030 a2=0 a3=1 items=0 ppid=2210 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:54:24.270000 audit[2346]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:24.270000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc2cb4970 a2=0 a3=1 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:54:24.273000 audit[2348]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:54:24.273000 audit[2348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc7722000 a2=0 a3=1 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.273000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:24.273000 audit[2348]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:54:24.273000 audit[2348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc7722000 a2=0 a3=1 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.273000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:24.997378 kubelet[2006]: E0702 01:54:24.997338 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:25.185218 kubelet[2006]: E0702 01:54:25.185173 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:25.998129 kubelet[2006]: E0702 01:54:25.998091 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:26.998783 kubelet[2006]: E0702 01:54:26.998721 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:27.068123 env[1447]: time="2024-07-02T01:54:27.068076275Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.074256 env[1447]: time="2024-07-02T01:54:27.074216047Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.077541 env[1447]: time="2024-07-02T01:54:27.077507842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.080398 env[1447]: time="2024-07-02T01:54:27.080344697Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.081064 env[1447]: time="2024-07-02T01:54:27.081033268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 01:54:27.083308 env[1447]: time="2024-07-02T01:54:27.083277925Z" level=info msg="CreateContainer within sandbox \"bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 01:54:27.103833 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4095461272.mount: Deactivated successfully. Jul 2 01:54:27.116388 env[1447]: time="2024-07-02T01:54:27.116323615Z" level=info msg="CreateContainer within sandbox \"bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39\"" Jul 2 01:54:27.117022 env[1447]: time="2024-07-02T01:54:27.116989143Z" level=info msg="StartContainer for \"a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39\"" Jul 2 01:54:27.142733 systemd[1]: run-containerd-runc-k8s.io-a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39-runc.pWnabc.mount: Deactivated successfully. Jul 2 01:54:27.144148 systemd[1]: Started cri-containerd-a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39.scope. Jul 2 01:54:27.186675 kernel: kauditd_printk_skb: 187 callbacks suppressed Jul 2 01:54:27.186797 kernel: audit: type=1400 audit(1719885267.160:527): avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.186884 kubelet[2006]: E0702 01:54:27.186590 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:27.160000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2064 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.213896 kernel: audit: type=1300 audit(1719885267.160:527): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2064 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135636337663933333330613762623461643738623665333632306664 Jul 2 01:54:27.237214 kernel: audit: type=1327 audit(1719885267.160:527): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135636337663933333330613762623461643738623665333632306664 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.253906 kernel: audit: type=1400 audit(1719885267.160:528): avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.270854 kernel: audit: type=1400 audit(1719885267.160:528): avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.288725 kernel: audit: type=1400 audit(1719885267.160:528): avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.306669 kernel: audit: type=1400 audit(1719885267.160:528): avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.326331 kernel: audit: type=1400 audit(1719885267.160:528): avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.333987 env[1447]: time="2024-07-02T01:54:27.333949111Z" level=info msg="StartContainer for \"a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39\" returns successfully" Jul 2 01:54:27.344947 kernel: audit: type=1400 audit(1719885267.160:528): avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.362885 kernel: audit: type=1400 audit(1719885267.160:528): avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.160000 audit: BPF prog-id=70 op=LOAD Jul 2 01:54:27.160000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2064 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135636337663933333330613762623461643738623665333632306664 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.167000 audit: BPF prog-id=71 op=LOAD Jul 2 01:54:27.167000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2064 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135636337663933333330613762623461643738623665333632306664 Jul 2 01:54:27.185000 audit: BPF prog-id=71 op=UNLOAD Jul 2 01:54:27.185000 audit: BPF prog-id=70 op=UNLOAD Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.185000 audit: BPF prog-id=72 op=LOAD Jul 2 01:54:27.185000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2064 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135636337663933333330613762623461643738623665333632306664 Jul 2 01:54:27.999163 kubelet[2006]: E0702 01:54:27.999112 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:28.999581 kubelet[2006]: E0702 01:54:28.999553 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:29.185134 kubelet[2006]: E0702 01:54:29.185104 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:30.000290 kubelet[2006]: E0702 01:54:30.000256 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:30.468234 env[1447]: time="2024-07-02T01:54:30.468161428Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:54:30.470894 systemd[1]: cri-containerd-a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39.scope: Deactivated successfully. Jul 2 01:54:30.475000 audit: BPF prog-id=72 op=UNLOAD Jul 2 01:54:30.489833 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39-rootfs.mount: Deactivated successfully. Jul 2 01:54:30.502161 kubelet[2006]: I0702 01:54:30.502115 2006 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 01:54:31.000800 kubelet[2006]: E0702 01:54:31.000771 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:31.189864 systemd[1]: Created slice kubepods-besteffort-podb7a3fb05_270a_4240_bc71_3514410bb228.slice. Jul 2 01:54:31.192350 env[1447]: time="2024-07-02T01:54:31.192308783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c9nvw,Uid:b7a3fb05-270a-4240-bc71-3514410bb228,Namespace:calico-system,Attempt:0,}" Jul 2 01:54:32.002115 kubelet[2006]: E0702 01:54:32.002076 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:32.217136 env[1447]: time="2024-07-02T01:54:32.217085498Z" level=info msg="shim disconnected" id=a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39 Jul 2 01:54:32.217136 env[1447]: time="2024-07-02T01:54:32.217135144Z" level=warning msg="cleaning up after shim disconnected" id=a5cc7f93330a7bb4ad78b6e3620fd424a089237d1419bd2068cb672fdc11bf39 namespace=k8s.io Jul 2 01:54:32.217538 env[1447]: time="2024-07-02T01:54:32.217146145Z" level=info msg="cleaning up dead shim" Jul 2 01:54:32.224793 env[1447]: time="2024-07-02T01:54:32.224733667Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:54:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2398 runtime=io.containerd.runc.v2\n" Jul 2 01:54:32.237414 env[1447]: time="2024-07-02T01:54:32.237367014Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 01:54:32.290419 env[1447]: time="2024-07-02T01:54:32.287451072Z" level=error msg="Failed to destroy network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:32.290419 env[1447]: time="2024-07-02T01:54:32.289458065Z" level=error msg="encountered an error cleaning up failed sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:32.290419 env[1447]: time="2024-07-02T01:54:32.289522473Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c9nvw,Uid:b7a3fb05-270a-4240-bc71-3514410bb228,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:32.290630 kubelet[2006]: E0702 01:54:32.290283 2006 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:32.290630 kubelet[2006]: E0702 01:54:32.290345 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-c9nvw" Jul 2 01:54:32.290630 kubelet[2006]: E0702 01:54:32.290388 2006 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-c9nvw" Jul 2 01:54:32.289122 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f-shm.mount: Deactivated successfully. Jul 2 01:54:32.290916 kubelet[2006]: E0702 01:54:32.290447 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-c9nvw_calico-system(b7a3fb05-270a-4240-bc71-3514410bb228)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-c9nvw_calico-system(b7a3fb05-270a-4240-bc71-3514410bb228)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:33.003068 kubelet[2006]: E0702 01:54:33.003028 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:33.240053 kubelet[2006]: I0702 01:54:33.239591 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:54:33.240405 env[1447]: time="2024-07-02T01:54:33.240342545Z" level=info msg="StopPodSandbox for \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\"" Jul 2 01:54:33.310058 env[1447]: time="2024-07-02T01:54:33.309897661Z" level=error msg="StopPodSandbox for \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\" failed" error="failed to destroy network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:33.310397 kubelet[2006]: E0702 01:54:33.310368 2006 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:54:33.310485 kubelet[2006]: E0702 01:54:33.310447 2006 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f"} Jul 2 01:54:33.310521 kubelet[2006]: E0702 01:54:33.310489 2006 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b7a3fb05-270a-4240-bc71-3514410bb228\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:54:33.310576 kubelet[2006]: E0702 01:54:33.310568 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b7a3fb05-270a-4240-bc71-3514410bb228\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-c9nvw" podUID="b7a3fb05-270a-4240-bc71-3514410bb228" Jul 2 01:54:33.393410 kubelet[2006]: I0702 01:54:33.393367 2006 topology_manager.go:215] "Topology Admit Handler" podUID="b2a04595-f09f-449e-ac1f-b53e89399a50" podNamespace="default" podName="nginx-deployment-6d5f899847-c62s4" Jul 2 01:54:33.400442 systemd[1]: Created slice kubepods-besteffort-podb2a04595_f09f_449e_ac1f_b53e89399a50.slice. Jul 2 01:54:33.477974 kubelet[2006]: I0702 01:54:33.477933 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c4jdb\" (UniqueName: \"kubernetes.io/projected/b2a04595-f09f-449e-ac1f-b53e89399a50-kube-api-access-c4jdb\") pod \"nginx-deployment-6d5f899847-c62s4\" (UID: \"b2a04595-f09f-449e-ac1f-b53e89399a50\") " pod="default/nginx-deployment-6d5f899847-c62s4" Jul 2 01:54:33.704977 env[1447]: time="2024-07-02T01:54:33.704931315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-c62s4,Uid:b2a04595-f09f-449e-ac1f-b53e89399a50,Namespace:default,Attempt:0,}" Jul 2 01:54:34.003593 kubelet[2006]: E0702 01:54:34.003262 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:34.784565 env[1447]: time="2024-07-02T01:54:34.784492555Z" level=error msg="Failed to destroy network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:34.788169 env[1447]: time="2024-07-02T01:54:34.786506537Z" level=error msg="encountered an error cleaning up failed sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:34.788169 env[1447]: time="2024-07-02T01:54:34.786567144Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-c62s4,Uid:b2a04595-f09f-449e-ac1f-b53e89399a50,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:34.788263 kubelet[2006]: E0702 01:54:34.787386 2006 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:34.788263 kubelet[2006]: E0702 01:54:34.787435 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-c62s4" Jul 2 01:54:34.788263 kubelet[2006]: E0702 01:54:34.787457 2006 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-c62s4" Jul 2 01:54:34.786260 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f-shm.mount: Deactivated successfully. Jul 2 01:54:34.788552 kubelet[2006]: E0702 01:54:34.787513 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-c62s4_default(b2a04595-f09f-449e-ac1f-b53e89399a50)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-c62s4_default(b2a04595-f09f-449e-ac1f-b53e89399a50)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-c62s4" podUID="b2a04595-f09f-449e-ac1f-b53e89399a50" Jul 2 01:54:35.004164 kubelet[2006]: E0702 01:54:35.004105 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:35.244388 kubelet[2006]: I0702 01:54:35.244096 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:54:35.244719 env[1447]: time="2024-07-02T01:54:35.244687780Z" level=info msg="StopPodSandbox for \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\"" Jul 2 01:54:35.295454 env[1447]: time="2024-07-02T01:54:35.295376958Z" level=error msg="StopPodSandbox for \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\" failed" error="failed to destroy network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:35.295934 kubelet[2006]: E0702 01:54:35.295783 2006 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:54:35.295934 kubelet[2006]: E0702 01:54:35.295836 2006 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f"} Jul 2 01:54:35.295934 kubelet[2006]: E0702 01:54:35.295876 2006 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b2a04595-f09f-449e-ac1f-b53e89399a50\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:54:35.295934 kubelet[2006]: E0702 01:54:35.295908 2006 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b2a04595-f09f-449e-ac1f-b53e89399a50\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-c62s4" podUID="b2a04595-f09f-449e-ac1f-b53e89399a50" Jul 2 01:54:36.004736 kubelet[2006]: E0702 01:54:36.004677 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:37.005448 kubelet[2006]: E0702 01:54:37.005395 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:37.290153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2279430936.mount: Deactivated successfully. Jul 2 01:54:38.102272 kubelet[2006]: E0702 01:54:37.992324 2006 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:38.102272 kubelet[2006]: E0702 01:54:38.005778 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:38.120870 env[1447]: time="2024-07-02T01:54:38.120799426Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:38.128152 env[1447]: time="2024-07-02T01:54:38.128107036Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:38.131873 env[1447]: time="2024-07-02T01:54:38.131836489Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:38.137797 env[1447]: time="2024-07-02T01:54:38.137759761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:38.138380 env[1447]: time="2024-07-02T01:54:38.138328618Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 01:54:38.152703 env[1447]: time="2024-07-02T01:54:38.152654090Z" level=info msg="CreateContainer within sandbox \"bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 01:54:38.194872 env[1447]: time="2024-07-02T01:54:38.194794182Z" level=info msg="CreateContainer within sandbox \"bb172503315f823ccaf95350c8af4b1b213a7d88c5c91676dcf336e5bb18a453\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f\"" Jul 2 01:54:38.195595 env[1447]: time="2024-07-02T01:54:38.195558459Z" level=info msg="StartContainer for \"a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f\"" Jul 2 01:54:38.211340 systemd[1]: Started cri-containerd-a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f.scope. Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.235939 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 01:54:38.236009 kernel: audit: type=1400 audit(1719885278.229:534): avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2064 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:38.278703 kernel: audit: type=1300 audit(1719885278.229:534): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2064 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:38.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336366623532623631306130343830646432643564376232393166 Jul 2 01:54:38.302434 kernel: audit: type=1327 audit(1719885278.229:534): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336366623532623631306130343830646432643564376232393166 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.324593 kernel: audit: type=1400 audit(1719885278.229:535): avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.341691 kernel: audit: type=1400 audit(1719885278.229:535): avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.358839 kernel: audit: type=1400 audit(1719885278.229:535): avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.359151 env[1447]: time="2024-07-02T01:54:38.359115248Z" level=info msg="StartContainer for \"a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f\" returns successfully" Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.376635 kernel: audit: type=1400 audit(1719885278.229:535): avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.394209 kernel: audit: type=1400 audit(1719885278.229:535): avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.411434 kernel: audit: type=1400 audit(1719885278.229:535): avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.430195 kernel: audit: type=1400 audit(1719885278.229:535): avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit: BPF prog-id=73 op=LOAD Jul 2 01:54:38.229000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2064 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:38.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336366623532623631306130343830646432643564376232393166 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit: BPF prog-id=74 op=LOAD Jul 2 01:54:38.229000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2064 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:38.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336366623532623631306130343830646432643564376232393166 Jul 2 01:54:38.229000 audit: BPF prog-id=74 op=UNLOAD Jul 2 01:54:38.229000 audit: BPF prog-id=73 op=UNLOAD Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:38.229000 audit: BPF prog-id=75 op=LOAD Jul 2 01:54:38.229000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2064 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:38.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336366623532623631306130343830646432643564376232393166 Jul 2 01:54:38.589715 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 01:54:38.589837 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 01:54:39.006874 kubelet[2006]: E0702 01:54:39.006829 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:39.266315 kubelet[2006]: I0702 01:54:39.266202 2006 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-s6xzr" podStartSLOduration=3.770527146 podStartE2EDuration="21.266142765s" podCreationTimestamp="2024-07-02 01:54:18 +0000 UTC" firstStartedPulling="2024-07-02 01:54:20.64311988 +0000 UTC m=+3.684177697" lastFinishedPulling="2024-07-02 01:54:38.138735499 +0000 UTC m=+21.179793316" observedRunningTime="2024-07-02 01:54:39.265496302 +0000 UTC m=+22.306554119" watchObservedRunningTime="2024-07-02 01:54:39.266142765 +0000 UTC m=+22.307200582" Jul 2 01:54:39.844000 audit[2655]: AVC avc: denied { write } for pid=2655 comm="tee" name="fd" dev="proc" ino=17327 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:39.844000 audit[2655]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffdb32a1a a2=241 a3=1b6 items=1 ppid=2603 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.844000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 01:54:39.845000 audit[2653]: AVC avc: denied { write } for pid=2653 comm="tee" name="fd" dev="proc" ino=18253 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:39.846000 audit[2648]: AVC avc: denied { write } for pid=2648 comm="tee" name="fd" dev="proc" ino=18256 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:39.847000 audit[2657]: AVC avc: denied { write } for pid=2657 comm="tee" name="fd" dev="proc" ino=18259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:39.848000 audit[2652]: AVC avc: denied { write } for pid=2652 comm="tee" name="fd" dev="proc" ino=18262 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:39.846000 audit[2648]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffbea7a08 a2=241 a3=1b6 items=1 ppid=2601 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.846000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 01:54:39.846000 audit: PATH item=0 name="/dev/fd/63" inode=18244 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:39.846000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:39.845000 audit[2653]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa547a18 a2=241 a3=1b6 items=1 ppid=2606 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.845000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 01:54:39.845000 audit: PATH item=0 name="/dev/fd/63" inode=17322 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:39.845000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:39.847000 audit[2657]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1b13a18 a2=241 a3=1b6 items=1 ppid=2597 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.847000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 01:54:39.847000 audit: PATH item=0 name="/dev/fd/63" inode=17323 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:39.847000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:39.848000 audit[2652]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6086a18 a2=241 a3=1b6 items=1 ppid=2594 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.848000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 01:54:39.848000 audit: PATH item=0 name="/dev/fd/63" inode=18247 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:39.848000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:39.851000 audit[2659]: AVC avc: denied { write } for pid=2659 comm="tee" name="fd" dev="proc" ino=17332 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:39.851000 audit[2659]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff60b5a09 a2=241 a3=1b6 items=1 ppid=2599 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.851000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 01:54:39.851000 audit: PATH item=0 name="/dev/fd/63" inode=17324 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:39.851000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:39.844000 audit: PATH item=0 name="/dev/fd/63" inode=18250 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:39.844000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:39.859000 audit[2664]: AVC avc: denied { write } for pid=2664 comm="tee" name="fd" dev="proc" ino=17336 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:39.859000 audit[2664]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4aa2a19 a2=241 a3=1b6 items=1 ppid=2605 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.859000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 01:54:39.859000 audit: PATH item=0 name="/dev/fd/63" inode=17329 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:39.859000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:40.007241 kubelet[2006]: E0702 01:54:40.007188 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:40.105984 kernel: Initializing XFRM netlink socket Jul 2 01:54:40.231577 systemd-networkd[1607]: vxlan.calico: Link UP Jul 2 01:54:40.231584 systemd-networkd[1607]: vxlan.calico: Gained carrier Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit: BPF prog-id=76 op=LOAD Jul 2 01:54:40.238000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe1b93b68 a2=70 a3=ffffe1b93bd8 items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.238000 audit: BPF prog-id=76 op=UNLOAD Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit: BPF prog-id=77 op=LOAD Jul 2 01:54:40.238000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe1b93b68 a2=70 a3=4b243c items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.238000 audit: BPF prog-id=77 op=UNLOAD Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe1b93b20 a2=70 a3=ffffe1b93b90 items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit: BPF prog-id=78 op=LOAD Jul 2 01:54:40.238000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe1b93b08 a2=70 a3=ffffe1b93b78 items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.238000 audit: BPF prog-id=78 op=UNLOAD Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe1b93bd8 a2=70 a3=0 items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe1b93bc8 a2=70 a3=0 items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.238000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.238000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe1b93b38 a2=70 a3=0 items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe1b93c10 a2=70 a3=3b10b48f items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe1b93c10 a2=70 a3=3b10b48f items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.239000 audit: BPF prog-id=79 op=LOAD Jul 2 01:54:40.239000 audit[2734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe1b93b38 a2=70 a3=3b10b4a9 items=0 ppid=2598 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:40.245000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.245000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff29b91c8 a2=70 a3=fffff29b9238 items=0 ppid=2598 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:54:40.245000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:40.245000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff29b9098 a2=70 a3=fffff29b9108 items=0 ppid=2598 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:54:40.255000 audit: BPF prog-id=79 op=UNLOAD Jul 2 01:54:40.400000 audit[2762]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:40.400000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc1a43be0 a2=0 a3=ffff907cffa8 items=0 ppid=2598 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.400000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:40.417000 audit[2763]: NETFILTER_CFG table=raw:69 family=2 entries=19 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:40.417000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffd2b39810 a2=0 a3=ffff80fbcfa8 items=0 ppid=2598 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.417000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:40.437000 audit[2765]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:40.437000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe8516f60 a2=0 a3=ffff8d1dcfa8 items=0 ppid=2598 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.437000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:40.439000 audit[2764]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:40.439000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffcec90740 a2=0 a3=ffffa5195fa8 items=0 ppid=2598 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.439000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:41.008212 kubelet[2006]: E0702 01:54:41.008172 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:41.015307 kubelet[2006]: I0702 01:54:41.014536 2006 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:54:41.033085 systemd[1]: run-containerd-runc-k8s.io-a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f-runc.bGsTbR.mount: Deactivated successfully. Jul 2 01:54:41.094238 systemd[1]: run-containerd-runc-k8s.io-a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f-runc.D0MgN1.mount: Deactivated successfully. Jul 2 01:54:41.973556 systemd-networkd[1607]: vxlan.calico: Gained IPv6LL Jul 2 01:54:42.008877 kubelet[2006]: E0702 01:54:42.008841 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:43.009916 kubelet[2006]: E0702 01:54:43.009861 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:44.010903 kubelet[2006]: E0702 01:54:44.010867 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:45.011930 kubelet[2006]: E0702 01:54:45.011887 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:46.013446 kubelet[2006]: E0702 01:54:46.013408 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:47.014050 kubelet[2006]: E0702 01:54:47.014013 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:47.186279 env[1447]: time="2024-07-02T01:54:47.186232183Z" level=info msg="StopPodSandbox for \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\"" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.229 [INFO][2839] k8s.go 608: Cleaning up netns ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.229 [INFO][2839] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" iface="eth0" netns="/var/run/netns/cni-b148311a-59ee-7b95-91e8-d6703e5a7081" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.229 [INFO][2839] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" iface="eth0" netns="/var/run/netns/cni-b148311a-59ee-7b95-91e8-d6703e5a7081" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.229 [INFO][2839] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" iface="eth0" netns="/var/run/netns/cni-b148311a-59ee-7b95-91e8-d6703e5a7081" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.229 [INFO][2839] k8s.go 615: Releasing IP address(es) ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.229 [INFO][2839] utils.go 188: Calico CNI releasing IP address ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.247 [INFO][2845] ipam_plugin.go 411: Releasing address using handleID ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.247 [INFO][2845] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.247 [INFO][2845] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.260 [WARNING][2845] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.260 [INFO][2845] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.262 [INFO][2845] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:47.264703 env[1447]: 2024-07-02 01:54:47.263 [INFO][2839] k8s.go 621: Teardown processing complete. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:54:47.266917 systemd[1]: run-netns-cni\x2db148311a\x2d59ee\x2d7b95\x2d91e8\x2dd6703e5a7081.mount: Deactivated successfully. Jul 2 01:54:47.268774 env[1447]: time="2024-07-02T01:54:47.267753047Z" level=info msg="TearDown network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\" successfully" Jul 2 01:54:47.268774 env[1447]: time="2024-07-02T01:54:47.267808612Z" level=info msg="StopPodSandbox for \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\" returns successfully" Jul 2 01:54:47.269175 env[1447]: time="2024-07-02T01:54:47.269137119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c9nvw,Uid:b7a3fb05-270a-4240-bc71-3514410bb228,Namespace:calico-system,Attempt:1,}" Jul 2 01:54:47.407825 systemd-networkd[1607]: caliecfd07869a3: Link UP Jul 2 01:54:47.419700 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:54:47.420290 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliecfd07869a3: link becomes ready Jul 2 01:54:47.419932 systemd-networkd[1607]: caliecfd07869a3: Gained carrier Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.341 [INFO][2851] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.45-k8s-csi--node--driver--c9nvw-eth0 csi-node-driver- calico-system b7a3fb05-270a-4240-bc71-3514410bb228 1285 0 2024-07-02 01:54:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.45 csi-node-driver-c9nvw eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliecfd07869a3 [] []}} ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.341 [INFO][2851] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.365 [INFO][2863] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" HandleID="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.378 [INFO][2863] ipam_plugin.go 264: Auto assigning IP ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" HandleID="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002edd30), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.45", "pod":"csi-node-driver-c9nvw", "timestamp":"2024-07-02 01:54:47.365520104 +0000 UTC"}, Hostname:"10.200.20.45", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.378 [INFO][2863] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.378 [INFO][2863] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.378 [INFO][2863] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.45' Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.379 [INFO][2863] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.383 [INFO][2863] ipam.go 372: Looking up existing affinities for host host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.387 [INFO][2863] ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.389 [INFO][2863] ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.391 [INFO][2863] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.391 [INFO][2863] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.393 [INFO][2863] ipam.go 1685: Creating new handle: k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.396 [INFO][2863] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.401 [INFO][2863] ipam.go 1216: Successfully claimed IPs: [192.168.126.193/26] block=192.168.126.192/26 handle="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.401 [INFO][2863] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.193/26] handle="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" host="10.200.20.45" Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.401 [INFO][2863] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:47.437775 env[1447]: 2024-07-02 01:54:47.401 [INFO][2863] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.126.193/26] IPv6=[] ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" HandleID="k8s-pod-network.641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.438383 env[1447]: 2024-07-02 01:54:47.403 [INFO][2851] k8s.go 386: Populated endpoint ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-csi--node--driver--c9nvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7a3fb05-270a-4240-bc71-3514410bb228", ResourceVersion:"1285", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"", Pod:"csi-node-driver-c9nvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliecfd07869a3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:47.438383 env[1447]: 2024-07-02 01:54:47.403 [INFO][2851] k8s.go 387: Calico CNI using IPs: [192.168.126.193/32] ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.438383 env[1447]: 2024-07-02 01:54:47.403 [INFO][2851] dataplane_linux.go 68: Setting the host side veth name to caliecfd07869a3 ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.438383 env[1447]: 2024-07-02 01:54:47.420 [INFO][2851] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.438383 env[1447]: 2024-07-02 01:54:47.421 [INFO][2851] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-csi--node--driver--c9nvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7a3fb05-270a-4240-bc71-3514410bb228", ResourceVersion:"1285", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f", Pod:"csi-node-driver-c9nvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliecfd07869a3", MAC:"1a:30:46:8b:21:a2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:47.438383 env[1447]: 2024-07-02 01:54:47.430 [INFO][2851] k8s.go 500: Wrote updated endpoint to datastore ContainerID="641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f" Namespace="calico-system" Pod="csi-node-driver-c9nvw" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:54:47.439000 audit[2880]: NETFILTER_CFG table=filter:72 family=2 entries=34 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:47.446539 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 01:54:47.446663 kernel: audit: type=1325 audit(1719885287.439:567): table=filter:72 family=2 entries=34 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:47.439000 audit[2880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffe28c2120 a2=0 a3=ffff8936bfa8 items=0 ppid=2598 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.492183 kernel: audit: type=1300 audit(1719885287.439:567): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffe28c2120 a2=0 a3=ffff8936bfa8 items=0 ppid=2598 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.439000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:47.513397 kernel: audit: type=1327 audit(1719885287.439:567): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:47.521123 env[1447]: time="2024-07-02T01:54:47.520839689Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:54:47.521123 env[1447]: time="2024-07-02T01:54:47.520882493Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:54:47.521123 env[1447]: time="2024-07-02T01:54:47.520893133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:54:47.526318 env[1447]: time="2024-07-02T01:54:47.521103710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f pid=2893 runtime=io.containerd.runc.v2 Jul 2 01:54:47.538887 systemd[1]: Started cri-containerd-641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f.scope. Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.584552 kernel: audit: type=1400 audit(1719885287.549:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.584660 kernel: audit: type=1400 audit(1719885287.549:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.602300 kernel: audit: type=1400 audit(1719885287.549:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.619479 kernel: audit: type=1400 audit(1719885287.549:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.636740 kernel: audit: type=1400 audit(1719885287.549:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.655032 kernel: audit: type=1400 audit(1719885287.549:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.672827 kernel: audit: type=1400 audit(1719885287.549:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.566000 audit: BPF prog-id=80 op=LOAD Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316664376430313863633737616430363936306139333934326234 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316664376430313863633737616430363936306139333934326234 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.583000 audit: BPF prog-id=81 op=LOAD Jul 2 01:54:47.583000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316664376430313863633737616430363936306139333934326234 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.601000 audit: BPF prog-id=82 op=LOAD Jul 2 01:54:47.601000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316664376430313863633737616430363936306139333934326234 Jul 2 01:54:47.618000 audit: BPF prog-id=82 op=UNLOAD Jul 2 01:54:47.618000 audit: BPF prog-id=81 op=UNLOAD Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:47.618000 audit: BPF prog-id=83 op=LOAD Jul 2 01:54:47.618000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316664376430313863633737616430363936306139333934326234 Jul 2 01:54:47.683734 env[1447]: time="2024-07-02T01:54:47.683679602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c9nvw,Uid:b7a3fb05-270a-4240-bc71-3514410bb228,Namespace:calico-system,Attempt:1,} returns sandbox id \"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f\"" Jul 2 01:54:47.686162 env[1447]: time="2024-07-02T01:54:47.686102477Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 01:54:48.014905 kubelet[2006]: E0702 01:54:48.014861 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:48.186956 env[1447]: time="2024-07-02T01:54:48.186874677Z" level=info msg="StopPodSandbox for \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\"" Jul 2 01:54:48.266944 systemd[1]: run-containerd-runc-k8s.io-641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f-runc.7OxT6w.mount: Deactivated successfully. Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.242 [INFO][2938] k8s.go 608: Cleaning up netns ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.242 [INFO][2938] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" iface="eth0" netns="/var/run/netns/cni-c98c76ae-e596-fe35-ea1a-06332e7f85e6" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.243 [INFO][2938] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" iface="eth0" netns="/var/run/netns/cni-c98c76ae-e596-fe35-ea1a-06332e7f85e6" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.243 [INFO][2938] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" iface="eth0" netns="/var/run/netns/cni-c98c76ae-e596-fe35-ea1a-06332e7f85e6" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.243 [INFO][2938] k8s.go 615: Releasing IP address(es) ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.243 [INFO][2938] utils.go 188: Calico CNI releasing IP address ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.263 [INFO][2944] ipam_plugin.go 411: Releasing address using handleID ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.263 [INFO][2944] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.263 [INFO][2944] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.274 [WARNING][2944] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.275 [INFO][2944] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.276 [INFO][2944] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:48.278732 env[1447]: 2024-07-02 01:54:48.277 [INFO][2938] k8s.go 621: Teardown processing complete. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:54:48.281935 env[1447]: time="2024-07-02T01:54:48.280634760Z" level=info msg="TearDown network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\" successfully" Jul 2 01:54:48.281935 env[1447]: time="2024-07-02T01:54:48.280679524Z" level=info msg="StopPodSandbox for \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\" returns successfully" Jul 2 01:54:48.280521 systemd[1]: run-netns-cni\x2dc98c76ae\x2de596\x2dfe35\x2dea1a\x2d06332e7f85e6.mount: Deactivated successfully. Jul 2 01:54:48.282513 env[1447]: time="2024-07-02T01:54:48.282477026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-c62s4,Uid:b2a04595-f09f-449e-ac1f-b53e89399a50,Namespace:default,Attempt:1,}" Jul 2 01:54:48.437559 systemd-networkd[1607]: caliecfd07869a3: Gained IPv6LL Jul 2 01:54:48.443591 systemd-networkd[1607]: cali866e355e590: Link UP Jul 2 01:54:48.457780 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:54:48.457949 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali866e355e590: link becomes ready Jul 2 01:54:48.458809 systemd-networkd[1607]: cali866e355e590: Gained carrier Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.365 [INFO][2950] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0 nginx-deployment-6d5f899847- default b2a04595-f09f-449e-ac1f-b53e89399a50 1292 0 2024-07-02 01:54:33 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.45 nginx-deployment-6d5f899847-c62s4 eth0 default [] [] [kns.default ksa.default.default] cali866e355e590 [] []}} ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.365 [INFO][2950] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.390 [INFO][2962] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" HandleID="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.404 [INFO][2962] ipam_plugin.go 264: Auto assigning IP ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" HandleID="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002edd60), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.45", "pod":"nginx-deployment-6d5f899847-c62s4", "timestamp":"2024-07-02 01:54:48.390779297 +0000 UTC"}, Hostname:"10.200.20.45", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.404 [INFO][2962] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.405 [INFO][2962] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.405 [INFO][2962] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.45' Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.406 [INFO][2962] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.410 [INFO][2962] ipam.go 372: Looking up existing affinities for host host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.413 [INFO][2962] ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.415 [INFO][2962] ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.417 [INFO][2962] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.417 [INFO][2962] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.418 [INFO][2962] ipam.go 1685: Creating new handle: k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9 Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.421 [INFO][2962] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.426 [INFO][2962] ipam.go 1216: Successfully claimed IPs: [192.168.126.194/26] block=192.168.126.192/26 handle="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.426 [INFO][2962] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.194/26] handle="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" host="10.200.20.45" Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.426 [INFO][2962] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:48.474395 env[1447]: 2024-07-02 01:54:48.426 [INFO][2962] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.126.194/26] IPv6=[] ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" HandleID="k8s-pod-network.751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.474958 env[1447]: 2024-07-02 01:54:48.428 [INFO][2950] k8s.go 386: Populated endpoint ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2a04595-f09f-449e-ac1f-b53e89399a50", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"", Pod:"nginx-deployment-6d5f899847-c62s4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali866e355e590", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:48.474958 env[1447]: 2024-07-02 01:54:48.428 [INFO][2950] k8s.go 387: Calico CNI using IPs: [192.168.126.194/32] ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.474958 env[1447]: 2024-07-02 01:54:48.428 [INFO][2950] dataplane_linux.go 68: Setting the host side veth name to cali866e355e590 ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.474958 env[1447]: 2024-07-02 01:54:48.459 [INFO][2950] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.474958 env[1447]: 2024-07-02 01:54:48.459 [INFO][2950] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2a04595-f09f-449e-ac1f-b53e89399a50", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9", Pod:"nginx-deployment-6d5f899847-c62s4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali866e355e590", MAC:"ea:60:ff:64:61:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:48.474958 env[1447]: 2024-07-02 01:54:48.469 [INFO][2950] k8s.go 500: Wrote updated endpoint to datastore ContainerID="751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9" Namespace="default" Pod="nginx-deployment-6d5f899847-c62s4" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:54:48.478000 audit[2984]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:48.478000 audit[2984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffc64c8f40 a2=0 a3=ffffa8e91fa8 items=0 ppid=2598 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:48.478000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:48.490950 env[1447]: time="2024-07-02T01:54:48.490562055Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:54:48.490950 env[1447]: time="2024-07-02T01:54:48.490607499Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:54:48.490950 env[1447]: time="2024-07-02T01:54:48.490618300Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:54:48.490950 env[1447]: time="2024-07-02T01:54:48.490827036Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9 pid=2991 runtime=io.containerd.runc.v2 Jul 2 01:54:48.506449 systemd[1]: Started cri-containerd-751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9.scope. Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.520000 audit: BPF prog-id=84 op=LOAD Jul 2 01:54:48.521000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.521000 audit[3003]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2991 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:48.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735316634643536303063633661366338323731313132363635353230 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2991 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:48.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735316634643536303063633661366338323731313132363635353230 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit: BPF prog-id=85 op=LOAD Jul 2 01:54:48.524000 audit[3003]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2991 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:48.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735316634643536303063633661366338323731313132363635353230 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.524000 audit: BPF prog-id=86 op=LOAD Jul 2 01:54:48.524000 audit[3003]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2991 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:48.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735316634643536303063633661366338323731313132363635353230 Jul 2 01:54:48.525000 audit: BPF prog-id=86 op=UNLOAD Jul 2 01:54:48.525000 audit: BPF prog-id=85 op=UNLOAD Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:48.525000 audit: BPF prog-id=87 op=LOAD Jul 2 01:54:48.525000 audit[3003]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2991 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:48.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735316634643536303063633661366338323731313132363635353230 Jul 2 01:54:48.549632 env[1447]: time="2024-07-02T01:54:48.549582075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-c62s4,Uid:b2a04595-f09f-449e-ac1f-b53e89399a50,Namespace:default,Attempt:1,} returns sandbox id \"751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9\"" Jul 2 01:54:48.993871 env[1447]: time="2024-07-02T01:54:48.993806070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:48.999596 env[1447]: time="2024-07-02T01:54:48.999548683Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:49.003254 env[1447]: time="2024-07-02T01:54:49.003215290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:49.006536 env[1447]: time="2024-07-02T01:54:49.006492823Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:49.007009 env[1447]: time="2024-07-02T01:54:49.006977420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 01:54:49.008262 env[1447]: time="2024-07-02T01:54:49.008219356Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 01:54:49.009622 env[1447]: time="2024-07-02T01:54:49.009590142Z" level=info msg="CreateContainer within sandbox \"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 01:54:49.015878 kubelet[2006]: E0702 01:54:49.015842 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:49.046474 env[1447]: time="2024-07-02T01:54:49.046421225Z" level=info msg="CreateContainer within sandbox \"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9d7a795ddc26aa8e61a90778b48ad4ffffb045b9156e4c11e38df5beec33ab9e\"" Jul 2 01:54:49.047308 env[1447]: time="2024-07-02T01:54:49.047274331Z" level=info msg="StartContainer for \"9d7a795ddc26aa8e61a90778b48ad4ffffb045b9156e4c11e38df5beec33ab9e\"" Jul 2 01:54:49.069925 systemd[1]: Started cri-containerd-9d7a795ddc26aa8e61a90778b48ad4ffffb045b9156e4c11e38df5beec33ab9e.scope. Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2893 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:49.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376137393564646332366161386536316139303737386234386164 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.083000 audit: BPF prog-id=88 op=LOAD Jul 2 01:54:49.083000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2893 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:49.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376137393564646332366161386536316139303737386234386164 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.084000 audit: BPF prog-id=89 op=LOAD Jul 2 01:54:49.084000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2893 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:49.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376137393564646332366161386536316139303737386234386164 Jul 2 01:54:49.084000 audit: BPF prog-id=89 op=UNLOAD Jul 2 01:54:49.084000 audit: BPF prog-id=88 op=UNLOAD Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:49.085000 audit: BPF prog-id=90 op=LOAD Jul 2 01:54:49.085000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2893 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:49.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376137393564646332366161386536316139303737386234386164 Jul 2 01:54:49.105009 env[1447]: time="2024-07-02T01:54:49.104959864Z" level=info msg="StartContainer for \"9d7a795ddc26aa8e61a90778b48ad4ffffb045b9156e4c11e38df5beec33ab9e\" returns successfully" Jul 2 01:54:49.781558 systemd-networkd[1607]: cali866e355e590: Gained IPv6LL Jul 2 01:54:50.016962 kubelet[2006]: E0702 01:54:50.016899 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:51.017829 kubelet[2006]: E0702 01:54:51.017780 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:51.768879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1089822755.mount: Deactivated successfully. Jul 2 01:54:52.018631 kubelet[2006]: E0702 01:54:52.018583 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:52.955621 env[1447]: time="2024-07-02T01:54:52.955576042Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:52.961884 env[1447]: time="2024-07-02T01:54:52.961827414Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:52.965700 env[1447]: time="2024-07-02T01:54:52.965657491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:52.968734 env[1447]: time="2024-07-02T01:54:52.968693230Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:52.969807 env[1447]: time="2024-07-02T01:54:52.969767788Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653\"" Jul 2 01:54:52.971558 env[1447]: time="2024-07-02T01:54:52.971474111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 01:54:52.972701 env[1447]: time="2024-07-02T01:54:52.972667277Z" level=info msg="CreateContainer within sandbox \"751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 01:54:52.999745 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount841197773.mount: Deactivated successfully. Jul 2 01:54:53.016830 env[1447]: time="2024-07-02T01:54:53.016774999Z" level=info msg="CreateContainer within sandbox \"751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"2627e441bb9459f355e180904f7a3c33e708b0d570ef2e147a389135175eb116\"" Jul 2 01:54:53.017739 env[1447]: time="2024-07-02T01:54:53.017711065Z" level=info msg="StartContainer for \"2627e441bb9459f355e180904f7a3c33e708b0d570ef2e147a389135175eb116\"" Jul 2 01:54:53.018781 kubelet[2006]: E0702 01:54:53.018726 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:53.037832 systemd[1]: Started cri-containerd-2627e441bb9459f355e180904f7a3c33e708b0d570ef2e147a389135175eb116.scope. Jul 2 01:54:53.056390 kernel: kauditd_printk_skb: 153 callbacks suppressed Jul 2 01:54:53.056508 kernel: audit: type=1400 audit(1719885293.050:611): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.110726 kernel: audit: type=1400 audit(1719885293.050:612): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.110858 kernel: audit: type=1400 audit(1719885293.050:613): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.128996 kernel: audit: type=1400 audit(1719885293.050:614): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.146753 kernel: audit: type=1400 audit(1719885293.050:615): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.165099 kernel: audit: type=1400 audit(1719885293.050:616): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.169094 env[1447]: time="2024-07-02T01:54:53.169052806Z" level=info msg="StartContainer for \"2627e441bb9459f355e180904f7a3c33e708b0d570ef2e147a389135175eb116\" returns successfully" Jul 2 01:54:53.182336 kernel: audit: type=1400 audit(1719885293.050:617): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.201658 kernel: audit: type=1400 audit(1719885293.050:618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.219644 kernel: audit: type=1400 audit(1719885293.050:619): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.219782 kernel: audit: type=1400 audit(1719885293.055:620): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.055000 audit: BPF prog-id=91 op=LOAD Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2991 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:53.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236323765343431626239343539663335356531383039303466376133 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2991 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:53.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236323765343431626239343539663335356531383039303466376133 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit: BPF prog-id=92 op=LOAD Jul 2 01:54:53.072000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2991 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:53.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236323765343431626239343539663335356531383039303466376133 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.072000 audit: BPF prog-id=93 op=LOAD Jul 2 01:54:53.072000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2991 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:53.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236323765343431626239343539663335356531383039303466376133 Jul 2 01:54:53.072000 audit: BPF prog-id=93 op=UNLOAD Jul 2 01:54:53.073000 audit: BPF prog-id=92 op=UNLOAD Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:53.073000 audit: BPF prog-id=94 op=LOAD Jul 2 01:54:53.073000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2991 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:53.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236323765343431626239343539663335356531383039303466376133 Jul 2 01:54:54.019283 kubelet[2006]: E0702 01:54:54.019235 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:54.173045 env[1447]: time="2024-07-02T01:54:54.172990572Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:54.178459 env[1447]: time="2024-07-02T01:54:54.178416188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:54.183537 env[1447]: time="2024-07-02T01:54:54.183499900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:54.188615 env[1447]: time="2024-07-02T01:54:54.188576571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:54.189338 env[1447]: time="2024-07-02T01:54:54.189022362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 01:54:54.191281 env[1447]: time="2024-07-02T01:54:54.191249596Z" level=info msg="CreateContainer within sandbox \"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 01:54:54.215038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3872361867.mount: Deactivated successfully. Jul 2 01:54:54.229153 env[1447]: time="2024-07-02T01:54:54.229093815Z" level=info msg="CreateContainer within sandbox \"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5acd3d08ac03fe0f65f8185ead7bd533fc265088635d9ace7398be92a55c91b9\"" Jul 2 01:54:54.229677 env[1447]: time="2024-07-02T01:54:54.229653174Z" level=info msg="StartContainer for \"5acd3d08ac03fe0f65f8185ead7bd533fc265088635d9ace7398be92a55c91b9\"" Jul 2 01:54:54.251678 systemd[1]: run-containerd-runc-k8s.io-5acd3d08ac03fe0f65f8185ead7bd533fc265088635d9ace7398be92a55c91b9-runc.OLh3xO.mount: Deactivated successfully. Jul 2 01:54:54.255189 systemd[1]: Started cri-containerd-5acd3d08ac03fe0f65f8185ead7bd533fc265088635d9ace7398be92a55c91b9.scope. Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2893 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:54.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561636433643038616330336665306636356638313835656164376264 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit: BPF prog-id=95 op=LOAD Jul 2 01:54:54.270000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2893 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:54.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561636433643038616330336665306636356638313835656164376264 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.270000 audit: BPF prog-id=96 op=LOAD Jul 2 01:54:54.270000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2893 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:54.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561636433643038616330336665306636356638313835656164376264 Jul 2 01:54:54.271000 audit: BPF prog-id=96 op=UNLOAD Jul 2 01:54:54.271000 audit: BPF prog-id=95 op=UNLOAD Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:54.271000 audit: BPF prog-id=97 op=LOAD Jul 2 01:54:54.271000 audit[3143]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2893 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:54.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561636433643038616330336665306636356638313835656164376264 Jul 2 01:54:54.290773 env[1447]: time="2024-07-02T01:54:54.290735241Z" level=info msg="StartContainer for \"5acd3d08ac03fe0f65f8185ead7bd533fc265088635d9ace7398be92a55c91b9\" returns successfully" Jul 2 01:54:55.019789 kubelet[2006]: E0702 01:54:55.019745 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:55.255158 kubelet[2006]: I0702 01:54:55.255120 2006 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 01:54:55.255158 kubelet[2006]: I0702 01:54:55.255156 2006 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 01:54:55.307878 kubelet[2006]: I0702 01:54:55.307770 2006 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-c62s4" podStartSLOduration=17.889084632 podStartE2EDuration="22.307727419s" podCreationTimestamp="2024-07-02 01:54:33 +0000 UTC" firstStartedPulling="2024-07-02 01:54:48.551706603 +0000 UTC m=+31.592764420" lastFinishedPulling="2024-07-02 01:54:52.97034939 +0000 UTC m=+36.011407207" observedRunningTime="2024-07-02 01:54:53.290997028 +0000 UTC m=+36.332054845" watchObservedRunningTime="2024-07-02 01:54:55.307727419 +0000 UTC m=+38.348785236" Jul 2 01:54:56.020683 kubelet[2006]: E0702 01:54:56.020649 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:57.021317 kubelet[2006]: E0702 01:54:57.021248 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:57.992702 kubelet[2006]: E0702 01:54:57.992657 2006 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:58.022062 kubelet[2006]: E0702 01:54:58.022005 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:59.022862 kubelet[2006]: E0702 01:54:59.022819 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:00.023551 kubelet[2006]: E0702 01:55:00.023501 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:01.024556 kubelet[2006]: E0702 01:55:01.024523 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:01.692000 audit[3187]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.699209 kernel: kauditd_printk_skb: 90 callbacks suppressed Jul 2 01:55:01.699253 kernel: audit: type=1325 audit(1719885301.692:635): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.692000 audit[3187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffdfe6d360 a2=0 a3=1 items=0 ppid=2210 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:01.713009 kubelet[2006]: I0702 01:55:01.712980 2006 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-c9nvw" podStartSLOduration=37.20807938 podStartE2EDuration="43.712940891s" podCreationTimestamp="2024-07-02 01:54:18 +0000 UTC" firstStartedPulling="2024-07-02 01:54:47.685027751 +0000 UTC m=+30.726085568" lastFinishedPulling="2024-07-02 01:54:54.189889262 +0000 UTC m=+37.230947079" observedRunningTime="2024-07-02 01:54:55.308584277 +0000 UTC m=+38.349642094" watchObservedRunningTime="2024-07-02 01:55:01.712940891 +0000 UTC m=+44.753998708" Jul 2 01:55:01.713327 kubelet[2006]: I0702 01:55:01.713311 2006 topology_manager.go:215] "Topology Admit Handler" podUID="be14fa33-56b3-4861-ac71-837351949a8c" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 01:55:01.740251 kernel: audit: type=1300 audit(1719885301.692:635): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffdfe6d360 a2=0 a3=1 items=0 ppid=2210 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:01.740720 kubelet[2006]: I0702 01:55:01.740673 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/be14fa33-56b3-4861-ac71-837351949a8c-data\") pod \"nfs-server-provisioner-0\" (UID: \"be14fa33-56b3-4861-ac71-837351949a8c\") " pod="default/nfs-server-provisioner-0" Jul 2 01:55:01.740819 kubelet[2006]: I0702 01:55:01.740733 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-twn6x\" (UniqueName: \"kubernetes.io/projected/be14fa33-56b3-4861-ac71-837351949a8c-kube-api-access-twn6x\") pod \"nfs-server-provisioner-0\" (UID: \"be14fa33-56b3-4861-ac71-837351949a8c\") " pod="default/nfs-server-provisioner-0" Jul 2 01:55:01.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:01.754094 kernel: audit: type=1327 audit(1719885301.692:635): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:01.692000 audit[3187]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.757757 systemd[1]: Created slice kubepods-besteffort-podbe14fa33_56b3_4861_ac71_837351949a8c.slice. Jul 2 01:55:01.768790 kernel: audit: type=1325 audit(1719885301.692:636): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.692000 audit[3187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffdfe6d360 a2=0 a3=1 items=0 ppid=2210 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:01.797572 kernel: audit: type=1300 audit(1719885301.692:636): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffdfe6d360 a2=0 a3=1 items=0 ppid=2210 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:01.797693 kernel: audit: type=1327 audit(1719885301.692:636): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:01.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:01.815000 audit[3191]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.815000 audit[3191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff9dda1f0 a2=0 a3=1 items=0 ppid=2210 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:01.855709 kernel: audit: type=1325 audit(1719885301.815:637): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.855811 kernel: audit: type=1300 audit(1719885301.815:637): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff9dda1f0 a2=0 a3=1 items=0 ppid=2210 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:01.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:01.870391 kernel: audit: type=1327 audit(1719885301.815:637): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:01.816000 audit[3191]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.886969 kernel: audit: type=1325 audit(1719885301.816:638): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:01.816000 audit[3191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff9dda1f0 a2=0 a3=1 items=0 ppid=2210 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:01.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:02.025536 kubelet[2006]: E0702 01:55:02.025413 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:02.061497 env[1447]: time="2024-07-02T01:55:02.061434359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:be14fa33-56b3-4861-ac71-837351949a8c,Namespace:default,Attempt:0,}" Jul 2 01:55:02.222123 systemd-networkd[1607]: cali60e51b789ff: Link UP Jul 2 01:55:02.236833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:55:02.236954 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 01:55:02.238775 systemd-networkd[1607]: cali60e51b789ff: Gained carrier Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.144 [INFO][3194] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.45-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default be14fa33-56b3-4861-ac71-837351949a8c 1361 0 2024-07-02 01:55:01 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.45 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.144 [INFO][3194] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.171 [INFO][3206] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" HandleID="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Workload="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.193 [INFO][3206] ipam_plugin.go 264: Auto assigning IP ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" HandleID="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Workload="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263e40), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.45", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 01:55:02.171485309 +0000 UTC"}, Hostname:"10.200.20.45", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.193 [INFO][3206] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.194 [INFO][3206] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.194 [INFO][3206] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.45' Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.195 [INFO][3206] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.199 [INFO][3206] ipam.go 372: Looking up existing affinities for host host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.203 [INFO][3206] ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.205 [INFO][3206] ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.207 [INFO][3206] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.207 [INFO][3206] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.208 [INFO][3206] ipam.go 1685: Creating new handle: k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423 Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.212 [INFO][3206] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.216 [INFO][3206] ipam.go 1216: Successfully claimed IPs: [192.168.126.195/26] block=192.168.126.192/26 handle="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.216 [INFO][3206] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.195/26] handle="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" host="10.200.20.45" Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.216 [INFO][3206] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:55:02.247615 env[1447]: 2024-07-02 01:55:02.216 [INFO][3206] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.126.195/26] IPv6=[] ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" HandleID="k8s-pod-network.e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Workload="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:55:02.248397 env[1447]: 2024-07-02 01:55:02.218 [INFO][3194] k8s.go 386: Populated endpoint ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"be14fa33-56b3-4861-ac71-837351949a8c", ResourceVersion:"1361", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 55, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:02.248397 env[1447]: 2024-07-02 01:55:02.218 [INFO][3194] k8s.go 387: Calico CNI using IPs: [192.168.126.195/32] ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:55:02.248397 env[1447]: 2024-07-02 01:55:02.218 [INFO][3194] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:55:02.248397 env[1447]: 2024-07-02 01:55:02.238 [INFO][3194] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:55:02.248557 env[1447]: 2024-07-02 01:55:02.239 [INFO][3194] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"be14fa33-56b3-4861-ac71-837351949a8c", ResourceVersion:"1361", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 55, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"5e:9d:a8:9e:60:1b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:02.248557 env[1447]: 2024-07-02 01:55:02.245 [INFO][3194] k8s.go 500: Wrote updated endpoint to datastore ContainerID="e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.45-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:55:02.263336 env[1447]: time="2024-07-02T01:55:02.263272744Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:55:02.263520 env[1447]: time="2024-07-02T01:55:02.263497358Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:55:02.263626 env[1447]: time="2024-07-02T01:55:02.263605804Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:55:02.263822 env[1447]: time="2024-07-02T01:55:02.263797415Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423 pid=3237 runtime=io.containerd.runc.v2 Jul 2 01:55:02.265000 audit[3227]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3227 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:55:02.265000 audit[3227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffc8e68ad0 a2=0 a3=ffffad1b9fa8 items=0 ppid=2598 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.265000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:55:02.280176 systemd[1]: Started cri-containerd-e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423.scope. Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit: BPF prog-id=98 op=LOAD Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3237 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383436666565306366346466323135633036386561623363626136 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3237 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383436666565306366346466323135633036386561623363626136 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit: BPF prog-id=99 op=LOAD Jul 2 01:55:02.298000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3237 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383436666565306366346466323135633036386561623363626136 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit: BPF prog-id=100 op=LOAD Jul 2 01:55:02.298000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3237 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383436666565306366346466323135633036386561623363626136 Jul 2 01:55:02.298000 audit: BPF prog-id=100 op=UNLOAD Jul 2 01:55:02.298000 audit: BPF prog-id=99 op=UNLOAD Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:02.298000 audit: BPF prog-id=101 op=LOAD Jul 2 01:55:02.298000 audit[3248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3237 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383436666565306366346466323135633036386561623363626136 Jul 2 01:55:02.322178 env[1447]: time="2024-07-02T01:55:02.322130004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:be14fa33-56b3-4861-ac71-837351949a8c,Namespace:default,Attempt:0,} returns sandbox id \"e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423\"" Jul 2 01:55:02.325845 env[1447]: time="2024-07-02T01:55:02.325796740Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 01:55:02.869466 systemd[1]: run-containerd-runc-k8s.io-e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423-runc.lMvcVI.mount: Deactivated successfully. Jul 2 01:55:03.026052 kubelet[2006]: E0702 01:55:03.026006 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:04.032290 kubelet[2006]: E0702 01:55:04.031969 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:04.054158 systemd-networkd[1607]: cali60e51b789ff: Gained IPv6LL Jul 2 01:55:05.033119 kubelet[2006]: E0702 01:55:05.033080 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:05.109928 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount115515917.mount: Deactivated successfully. Jul 2 01:55:06.033474 kubelet[2006]: E0702 01:55:06.033424 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:07.034360 kubelet[2006]: E0702 01:55:07.034308 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:08.034891 kubelet[2006]: E0702 01:55:08.034844 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:08.390672 env[1447]: time="2024-07-02T01:55:08.390618081Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:08.397885 env[1447]: time="2024-07-02T01:55:08.397838541Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:08.401728 env[1447]: time="2024-07-02T01:55:08.401678982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:08.406772 env[1447]: time="2024-07-02T01:55:08.406729968Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:08.407607 env[1447]: time="2024-07-02T01:55:08.407574852Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Jul 2 01:55:08.410583 env[1447]: time="2024-07-02T01:55:08.410543048Z" level=info msg="CreateContainer within sandbox \"e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 01:55:08.432242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount313068743.mount: Deactivated successfully. Jul 2 01:55:08.438246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3211682875.mount: Deactivated successfully. Jul 2 01:55:08.455994 env[1447]: time="2024-07-02T01:55:08.455931673Z" level=info msg="CreateContainer within sandbox \"e5846fee0cf4df215c068eab3cba61a29e64cebd70866354042542064849a423\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"61e26455afc4c76d3643c04776623e4ca4d7db9facd7857176c1eca10138bde7\"" Jul 2 01:55:08.456828 env[1447]: time="2024-07-02T01:55:08.456795878Z" level=info msg="StartContainer for \"61e26455afc4c76d3643c04776623e4ca4d7db9facd7857176c1eca10138bde7\"" Jul 2 01:55:08.475538 systemd[1]: Started cri-containerd-61e26455afc4c76d3643c04776623e4ca4d7db9facd7857176c1eca10138bde7.scope. Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494002 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 01:55:08.494180 kernel: audit: type=1400 audit(1719885308.488:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.526104 kernel: audit: type=1400 audit(1719885308.488:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.526196 kernel: audit: type=1400 audit(1719885308.488:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.559295 kernel: audit: type=1400 audit(1719885308.488:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.559432 kernel: audit: type=1400 audit(1719885308.488:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.592569 kernel: audit: type=1400 audit(1719885308.488:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.611783 kernel: audit: type=1400 audit(1719885308.488:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.618484 kernel: audit: type=1400 audit(1719885308.488:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.618875 env[1447]: time="2024-07-02T01:55:08.618829151Z" level=info msg="StartContainer for \"61e26455afc4c76d3643c04776623e4ca4d7db9facd7857176c1eca10138bde7\" returns successfully" Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.648528 kernel: audit: type=1400 audit(1719885308.488:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.665219 kernel: audit: type=1400 audit(1719885308.488:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.488000 audit: BPF prog-id=102 op=LOAD Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3237 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:08.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653236343535616663346337366433363433633034373736363233 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3237 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:08.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653236343535616663346337366433363433633034373736363233 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.492000 audit: BPF prog-id=103 op=LOAD Jul 2 01:55:08.492000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3237 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:08.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653236343535616663346337366433363433633034373736363233 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.494000 audit: BPF prog-id=104 op=LOAD Jul 2 01:55:08.494000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3237 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:08.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653236343535616663346337366433363433633034373736363233 Jul 2 01:55:08.509000 audit: BPF prog-id=104 op=UNLOAD Jul 2 01:55:08.509000 audit: BPF prog-id=103 op=UNLOAD Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:08.510000 audit: BPF prog-id=105 op=LOAD Jul 2 01:55:08.510000 audit[3280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3237 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:08.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653236343535616663346337366433363433633034373736363233 Jul 2 01:55:08.667000 audit[3306]: AVC avc: denied { search } for pid=3306 comm="rpcbind" name="crypto" dev="proc" ino=21591 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 01:55:08.667000 audit[3306]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff90b2f000 a2=0 a3=0 items=0 ppid=3291 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 key=(null) Jul 2 01:55:08.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 01:55:08.705000 audit[3311]: AVC avc: denied { search } for pid=3311 comm="dbus-daemon" name="crypto" dev="proc" ino=21591 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 01:55:08.705000 audit[3311]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff95b1f000 a2=0 a3=0 items=0 ppid=3291 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 key=(null) Jul 2 01:55:08.705000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 01:55:08.709000 audit[3312]: AVC avc: denied { watch } for pid=3312 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537663 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c317,c331 tclass=dir permissive=0 Jul 2 01:55:08.709000 audit[3312]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaed6cb710 a2=2c8 a3=aaaaed6bda60 items=0 ppid=3291 pid=3312 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 key=(null) Jul 2 01:55:08.709000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 01:55:08.713000 audit[3313]: AVC avc: denied { read } for pid=3313 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21617 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 01:55:08.713000 audit[3313]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff86cda570 a2=80000 a3=0 items=0 ppid=3291 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 key=(null) Jul 2 01:55:08.713000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 01:55:08.714000 audit[3313]: AVC avc: denied { search } for pid=3313 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21591 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 01:55:08.714000 audit[3313]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8606f000 a2=0 a3=0 items=0 ppid=3291 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c331 key=(null) Jul 2 01:55:08.714000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 01:55:09.036028 kubelet[2006]: E0702 01:55:09.035919 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:09.335280 kubelet[2006]: I0702 01:55:09.335238 2006 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.251670151 podStartE2EDuration="8.33519684s" podCreationTimestamp="2024-07-02 01:55:01 +0000 UTC" firstStartedPulling="2024-07-02 01:55:02.325003693 +0000 UTC m=+45.366061510" lastFinishedPulling="2024-07-02 01:55:08.408530382 +0000 UTC m=+51.449588199" observedRunningTime="2024-07-02 01:55:09.33499015 +0000 UTC m=+52.376047967" watchObservedRunningTime="2024-07-02 01:55:09.33519684 +0000 UTC m=+52.376254657" Jul 2 01:55:09.346000 audit[3318]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:09.346000 audit[3318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd2a01c80 a2=0 a3=1 items=0 ppid=2210 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:09.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:09.348000 audit[3318]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:55:09.348000 audit[3318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd2a01c80 a2=0 a3=1 items=0 ppid=2210 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:09.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:55:10.036772 kubelet[2006]: E0702 01:55:10.036722 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:11.031259 systemd[1]: run-containerd-runc-k8s.io-a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f-runc.TcHvxk.mount: Deactivated successfully. Jul 2 01:55:11.036923 kubelet[2006]: E0702 01:55:11.036889 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:12.037152 kubelet[2006]: E0702 01:55:12.037113 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:13.037536 kubelet[2006]: E0702 01:55:13.037500 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:14.038366 kubelet[2006]: E0702 01:55:14.038326 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:15.038498 kubelet[2006]: E0702 01:55:15.038467 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:16.039369 kubelet[2006]: E0702 01:55:16.039322 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:16.529866 update_engine[1434]: I0702 01:55:16.529819 1434 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 2 01:55:16.529866 update_engine[1434]: I0702 01:55:16.529862 1434 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 2 01:55:16.530253 update_engine[1434]: I0702 01:55:16.529999 1434 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 2 01:55:16.530518 update_engine[1434]: I0702 01:55:16.530489 1434 omaha_request_params.cc:62] Current group set to lts Jul 2 01:55:16.530760 update_engine[1434]: I0702 01:55:16.530607 1434 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 2 01:55:16.530760 update_engine[1434]: I0702 01:55:16.530617 1434 update_attempter.cc:643] Scheduling an action processor start. Jul 2 01:55:16.530760 update_engine[1434]: I0702 01:55:16.530634 1434 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 01:55:16.530760 update_engine[1434]: I0702 01:55:16.530661 1434 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 2 01:55:16.531085 locksmithd[1519]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 2 01:55:16.531282 update_engine[1434]: I0702 01:55:16.531150 1434 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 01:55:16.531282 update_engine[1434]: I0702 01:55:16.531159 1434 omaha_request_action.cc:271] Request: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: Jul 2 01:55:16.531282 update_engine[1434]: I0702 01:55:16.531163 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:55:16.625883 update_engine[1434]: I0702 01:55:16.625838 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:55:16.626191 update_engine[1434]: I0702 01:55:16.626169 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:55:16.716521 update_engine[1434]: E0702 01:55:16.716454 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:55:16.716636 update_engine[1434]: I0702 01:55:16.716605 1434 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 2 01:55:17.040571 kubelet[2006]: E0702 01:55:17.040511 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:17.992476 kubelet[2006]: E0702 01:55:17.992431 2006 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:18.041102 kubelet[2006]: E0702 01:55:18.041077 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:18.170263 env[1447]: time="2024-07-02T01:55:18.170183213Z" level=info msg="StopPodSandbox for \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\"" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.223 [WARNING][3366] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-csi--node--driver--c9nvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7a3fb05-270a-4240-bc71-3514410bb228", ResourceVersion:"1329", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f", Pod:"csi-node-driver-c9nvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliecfd07869a3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.224 [INFO][3366] k8s.go 608: Cleaning up netns ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.224 [INFO][3366] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" iface="eth0" netns="" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.224 [INFO][3366] k8s.go 615: Releasing IP address(es) ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.224 [INFO][3366] utils.go 188: Calico CNI releasing IP address ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.245 [INFO][3374] ipam_plugin.go 411: Releasing address using handleID ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.246 [INFO][3374] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.246 [INFO][3374] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.255 [WARNING][3374] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.255 [INFO][3374] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.257 [INFO][3374] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:55:18.260127 env[1447]: 2024-07-02 01:55:18.258 [INFO][3366] k8s.go 621: Teardown processing complete. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.260650 env[1447]: time="2024-07-02T01:55:18.260613072Z" level=info msg="TearDown network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\" successfully" Jul 2 01:55:18.260726 env[1447]: time="2024-07-02T01:55:18.260711116Z" level=info msg="StopPodSandbox for \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\" returns successfully" Jul 2 01:55:18.261372 env[1447]: time="2024-07-02T01:55:18.261329903Z" level=info msg="RemovePodSandbox for \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\"" Jul 2 01:55:18.261538 env[1447]: time="2024-07-02T01:55:18.261497591Z" level=info msg="Forcibly stopping sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\"" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.299 [WARNING][3392] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-csi--node--driver--c9nvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7a3fb05-270a-4240-bc71-3514410bb228", ResourceVersion:"1329", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"641fd7d018cc77ad06960a93942b43aafb05940846033bc50f628208d40c146f", Pod:"csi-node-driver-c9nvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliecfd07869a3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.300 [INFO][3392] k8s.go 608: Cleaning up netns ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.300 [INFO][3392] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" iface="eth0" netns="" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.300 [INFO][3392] k8s.go 615: Releasing IP address(es) ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.300 [INFO][3392] utils.go 188: Calico CNI releasing IP address ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.320 [INFO][3398] ipam_plugin.go 411: Releasing address using handleID ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.320 [INFO][3398] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.320 [INFO][3398] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.329 [WARNING][3398] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.329 [INFO][3398] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" HandleID="k8s-pod-network.8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Workload="10.200.20.45-k8s-csi--node--driver--c9nvw-eth0" Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.331 [INFO][3398] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:55:18.333479 env[1447]: 2024-07-02 01:55:18.332 [INFO][3392] k8s.go 621: Teardown processing complete. ContainerID="8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f" Jul 2 01:55:18.334010 env[1447]: time="2024-07-02T01:55:18.333965771Z" level=info msg="TearDown network for sandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\" successfully" Jul 2 01:55:18.342893 env[1447]: time="2024-07-02T01:55:18.342842485Z" level=info msg="RemovePodSandbox \"8c7e32bbd9ccb89a6b3a2fd0c1c8e785524316ecf32d36a2ff77cff4cafd052f\" returns successfully" Jul 2 01:55:18.343587 env[1447]: time="2024-07-02T01:55:18.343561837Z" level=info msg="StopPodSandbox for \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\"" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.383 [WARNING][3416] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2a04595-f09f-449e-ac1f-b53e89399a50", ResourceVersion:"1317", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9", Pod:"nginx-deployment-6d5f899847-c62s4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali866e355e590", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.384 [INFO][3416] k8s.go 608: Cleaning up netns ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.384 [INFO][3416] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" iface="eth0" netns="" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.384 [INFO][3416] k8s.go 615: Releasing IP address(es) ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.384 [INFO][3416] utils.go 188: Calico CNI releasing IP address ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.403 [INFO][3423] ipam_plugin.go 411: Releasing address using handleID ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.403 [INFO][3423] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.403 [INFO][3423] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.413 [WARNING][3423] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.413 [INFO][3423] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.414 [INFO][3423] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:55:18.416731 env[1447]: 2024-07-02 01:55:18.415 [INFO][3416] k8s.go 621: Teardown processing complete. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.417370 env[1447]: time="2024-07-02T01:55:18.416768810Z" level=info msg="TearDown network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\" successfully" Jul 2 01:55:18.417370 env[1447]: time="2024-07-02T01:55:18.416801091Z" level=info msg="StopPodSandbox for \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\" returns successfully" Jul 2 01:55:18.417587 env[1447]: time="2024-07-02T01:55:18.417550845Z" level=info msg="RemovePodSandbox for \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\"" Jul 2 01:55:18.417646 env[1447]: time="2024-07-02T01:55:18.417595207Z" level=info msg="Forcibly stopping sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\"" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.453 [WARNING][3443] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2a04595-f09f-449e-ac1f-b53e89399a50", ResourceVersion:"1317", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"751f4d5600cc6a6c8271112665520b6f685a875781609c22fa1480dd69a3ffa9", Pod:"nginx-deployment-6d5f899847-c62s4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali866e355e590", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.453 [INFO][3443] k8s.go 608: Cleaning up netns ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.453 [INFO][3443] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" iface="eth0" netns="" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.453 [INFO][3443] k8s.go 615: Releasing IP address(es) ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.453 [INFO][3443] utils.go 188: Calico CNI releasing IP address ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.479 [INFO][3449] ipam_plugin.go 411: Releasing address using handleID ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.479 [INFO][3449] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.479 [INFO][3449] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.493 [WARNING][3449] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.493 [INFO][3449] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" HandleID="k8s-pod-network.a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Workload="10.200.20.45-k8s-nginx--deployment--6d5f899847--c62s4-eth0" Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.494 [INFO][3449] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:55:18.497331 env[1447]: 2024-07-02 01:55:18.496 [INFO][3443] k8s.go 621: Teardown processing complete. ContainerID="a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f" Jul 2 01:55:18.497975 env[1447]: time="2024-07-02T01:55:18.497938137Z" level=info msg="TearDown network for sandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\" successfully" Jul 2 01:55:18.504747 env[1447]: time="2024-07-02T01:55:18.504699237Z" level=info msg="RemovePodSandbox \"a6fad84c3d4b97fe4259215683a403ad978db8dbe32cd48474f92ade54d2f59f\" returns successfully" Jul 2 01:55:19.041765 kubelet[2006]: E0702 01:55:19.041735 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:20.043150 kubelet[2006]: E0702 01:55:20.043112 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:21.044480 kubelet[2006]: E0702 01:55:21.044441 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:22.044851 kubelet[2006]: E0702 01:55:22.044807 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:23.045201 kubelet[2006]: E0702 01:55:23.045168 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:24.045790 kubelet[2006]: E0702 01:55:24.045736 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:25.046639 kubelet[2006]: E0702 01:55:25.046601 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:26.047368 kubelet[2006]: E0702 01:55:26.047319 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:26.528184 update_engine[1434]: I0702 01:55:26.528141 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:55:26.528522 update_engine[1434]: I0702 01:55:26.528342 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:55:26.528598 update_engine[1434]: I0702 01:55:26.528571 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:55:26.641721 update_engine[1434]: E0702 01:55:26.641690 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:55:26.641812 update_engine[1434]: I0702 01:55:26.641795 1434 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 2 01:55:27.048362 kubelet[2006]: E0702 01:55:27.048320 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:28.048687 kubelet[2006]: E0702 01:55:28.048640 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:29.048989 kubelet[2006]: E0702 01:55:29.048945 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:30.049095 kubelet[2006]: E0702 01:55:30.049048 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:31.049980 kubelet[2006]: E0702 01:55:31.049937 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:32.050948 kubelet[2006]: E0702 01:55:32.050909 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:33.051873 kubelet[2006]: E0702 01:55:33.051833 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:33.424105 kubelet[2006]: I0702 01:55:33.424069 2006 topology_manager.go:215] "Topology Admit Handler" podUID="a341e897-d635-4be8-b074-ed2d4f0c7164" podNamespace="default" podName="test-pod-1" Jul 2 01:55:33.428600 systemd[1]: Created slice kubepods-besteffort-poda341e897_d635_4be8_b074_ed2d4f0c7164.slice. Jul 2 01:55:33.608590 kubelet[2006]: I0702 01:55:33.608552 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j2m67\" (UniqueName: \"kubernetes.io/projected/a341e897-d635-4be8-b074-ed2d4f0c7164-kube-api-access-j2m67\") pod \"test-pod-1\" (UID: \"a341e897-d635-4be8-b074-ed2d4f0c7164\") " pod="default/test-pod-1" Jul 2 01:55:33.608762 kubelet[2006]: I0702 01:55:33.608618 2006 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-8ef6d93d-54ed-4415-bf41-d7cd591a30cb\" (UniqueName: \"kubernetes.io/nfs/a341e897-d635-4be8-b074-ed2d4f0c7164-pvc-8ef6d93d-54ed-4415-bf41-d7cd591a30cb\") pod \"test-pod-1\" (UID: \"a341e897-d635-4be8-b074-ed2d4f0c7164\") " pod="default/test-pod-1" Jul 2 01:55:33.781943 kernel: Failed to create system directory netfs Jul 2 01:55:33.782113 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 01:55:33.782146 kernel: audit: type=1400 audit(1719885333.775:683): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.775000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.805552 kernel: Failed to create system directory netfs Jul 2 01:55:33.805658 kernel: audit: type=1400 audit(1719885333.775:683): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.775000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.832593 kernel: Failed to create system directory netfs Jul 2 01:55:33.832718 kernel: audit: type=1400 audit(1719885333.775:683): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.775000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.855759 kernel: Failed to create system directory netfs Jul 2 01:55:33.855895 kernel: audit: type=1400 audit(1719885333.775:683): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.775000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.775000 audit[3493]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf622c5e0 a1=12c14 a2=aaaadd73e028 a3=aaaaf621d010 items=0 ppid=557 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:33.909649 kernel: audit: type=1300 audit(1719885333.775:683): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf622c5e0 a1=12c14 a2=aaaadd73e028 a3=aaaaf621d010 items=0 ppid=557 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:33.775000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:33.924568 kernel: audit: type=1327 audit(1719885333.775:683): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:33.924678 kernel: Failed to create system directory fscache Jul 2 01:55:33.924723 kernel: audit: type=1400 audit(1719885333.888:684): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.943488 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.969626 kernel: audit: type=1400 audit(1719885333.888:684): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.969715 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.993164 kernel: audit: type=1400 audit(1719885333.888:684): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.993271 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.019610 kernel: audit: type=1400 audit(1719885333.888:684): avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.019693 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.029226 kernel: Failed to create system directory fscache Jul 2 01:55:34.029328 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.038237 kernel: Failed to create system directory fscache Jul 2 01:55:34.038350 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.047986 kernel: Failed to create system directory fscache Jul 2 01:55:34.048119 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.052448 kubelet[2006]: E0702 01:55:34.052414 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:34.052825 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.062905 kernel: Failed to create system directory fscache Jul 2 01:55:33.888000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.067687 kernel: Failed to create system directory fscache Jul 2 01:55:34.071497 kernel: FS-Cache: Loaded Jul 2 01:55:33.888000 audit[3493]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf643f210 a1=4c344 a2=aaaadd73e028 a3=aaaaf621d010 items=0 ppid=557 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:33.888000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.133779 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.133836 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.133871 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.142669 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.142755 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.151446 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.151533 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.162400 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.162513 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.171213 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.171290 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.180310 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.180402 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.188587 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.193156 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.197646 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.202735 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.202816 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.211265 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.211332 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.219127 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.223039 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.223137 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.231130 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.231223 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.238949 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.239009 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.246402 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.246462 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.255293 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.255371 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.262863 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.262925 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.270220 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.270305 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.277403 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.281716 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.281759 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.288973 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.289038 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.296938 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.297014 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.305844 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.305913 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.314525 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.314570 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.323176 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.323257 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.330874 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.334900 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.334960 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.342383 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.342434 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.351421 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.351477 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.359561 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.359632 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.366990 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.367392 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.375288 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.375404 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.382843 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.386916 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.386959 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.394273 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.394367 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.401790 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.401865 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.410572 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.410638 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.418490 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.418569 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.426057 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.426119 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.433192 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.433264 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.440691 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.440729 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.447846 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.447917 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.456199 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.456249 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.464273 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.464329 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.471539 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.471592 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.478639 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.478711 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.485843 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.485892 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.493276 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.493338 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.501472 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.501529 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.509341 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.509412 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.513381 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.521148 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.521267 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.528477 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.528534 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.536064 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.536161 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.543201 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.547041 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.547082 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.551910 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.559733 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.559804 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.567103 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.567139 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.574198 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.574252 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.581364 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.581422 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.588547 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.588613 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.595645 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.601154 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.601262 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.608968 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.609026 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.612648 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.619739 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.619797 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.623289 kernel: Failed to create system directory sunrpc Jul 2 01:55:34.119000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.639274 kernel: RPC: Registered named UNIX socket transport module. Jul 2 01:55:34.639403 kernel: RPC: Registered udp transport module. Jul 2 01:55:34.639430 kernel: RPC: Registered tcp transport module. Jul 2 01:55:34.647426 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 01:55:34.119000 audit[3493]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf648b560 a1=14a514 a2=aaaadd73e028 a3=aaaaf621d010 items=6 ppid=557 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:34.119000 audit: CWD cwd="/" Jul 2 01:55:34.119000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:34.119000 audit: PATH item=1 name=(null) inode=22042 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:34.119000 audit: PATH item=2 name=(null) inode=22042 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:34.119000 audit: PATH item=3 name=(null) inode=22043 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:34.119000 audit: PATH item=4 name=(null) inode=22042 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:34.119000 audit: PATH item=5 name=(null) inode=22044 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:34.119000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.738975 kernel: Failed to create system directory nfs Jul 2 01:55:34.739071 kernel: Failed to create system directory nfs Jul 2 01:55:34.739102 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.746266 kernel: Failed to create system directory nfs Jul 2 01:55:34.746304 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.753083 kernel: Failed to create system directory nfs Jul 2 01:55:34.753139 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.761819 kernel: Failed to create system directory nfs Jul 2 01:55:34.761879 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.768893 kernel: Failed to create system directory nfs Jul 2 01:55:34.768968 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.775821 kernel: Failed to create system directory nfs Jul 2 01:55:34.775858 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.779203 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.786502 kernel: Failed to create system directory nfs Jul 2 01:55:34.786565 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.789928 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.793333 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.796698 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.800157 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.804479 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.808626 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.815645 kernel: Failed to create system directory nfs Jul 2 01:55:34.815697 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.819189 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.822532 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.825931 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.829239 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.832892 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.840058 kernel: Failed to create system directory nfs Jul 2 01:55:34.840108 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.846795 kernel: Failed to create system directory nfs Jul 2 01:55:34.846832 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.851368 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.855284 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.859136 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.862761 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.866397 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.869816 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.873439 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.876786 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.880214 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.883727 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.890609 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.894347 kernel: Failed to create system directory nfs Jul 2 01:55:34.894414 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.902827 kernel: Failed to create system directory nfs Jul 2 01:55:34.902897 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.906719 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.910559 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.918528 kernel: Failed to create system directory nfs Jul 2 01:55:34.918586 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.925188 kernel: Failed to create system directory nfs Jul 2 01:55:34.925219 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.928551 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.931956 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.935431 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.938706 kernel: Failed to create system directory nfs Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.727000 audit[3493]: AVC avc: denied { confidentiality } for pid=3493 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:34.945922 kernel: Failed to create system directory nfs Jul 2 01:55:34.964452 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 01:55:34.727000 audit[3493]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf6634740 a1=1158a4 a2=aaaadd73e028 a3=aaaaf621d010 items=0 ppid=557 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:34.727000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.053257 kubelet[2006]: E0702 01:55:35.053147 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:35.055907 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.055994 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.056025 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.063896 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.063978 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.067333 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.070952 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.074328 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.077857 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.084904 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.085023 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.091822 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.091874 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.100224 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.105267 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.105340 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.113789 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.113842 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.121603 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.121681 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.128839 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.128919 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.132609 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.136345 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.143548 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.143637 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.147143 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.157185 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.157265 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.160891 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.165412 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.173226 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.173279 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.176870 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.180834 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.188090 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.188179 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.195453 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.195509 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.204612 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.208603 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.208645 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.215666 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.215724 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.222528 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.226145 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.226202 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.232989 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.233073 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.236498 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.243400 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.243488 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.246854 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.250474 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.257260 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.262691 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.262774 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.266820 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.270832 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.274432 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.282655 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.282734 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.290009 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.290097 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.297696 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.297760 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.305053 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.305095 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.310112 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.318959 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.319045 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.327326 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.327405 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.331235 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.335286 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.342808 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.342901 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.350349 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.350409 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.354997 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.359039 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.362913 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.370474 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.370557 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.377625 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.377708 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.384867 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.384976 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.388394 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.392061 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.400074 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.400161 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.409419 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.409503 kernel: Failed to create system directory nfs4 Jul 2 01:55:35.042000 audit[3498]: AVC avc: denied { confidentiality } for pid=3498 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.519084 kernel: NFS: Registering the id_resolver key type Jul 2 01:55:35.519194 kernel: Key type id_resolver registered Jul 2 01:55:35.519239 kernel: Key type id_legacy registered Jul 2 01:55:35.042000 audit[3498]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb4b1b010 a1=19c0bc a2=aaaac3d5e028 a3=aaaaf4b15010 items=0 ppid=557 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.042000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.597399 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.597495 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.597557 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.601157 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.614342 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.614472 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.614492 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.618388 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.626312 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.626389 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.633990 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.638282 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.638350 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.645871 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.645952 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.654504 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.654602 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.662752 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.662798 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.670397 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.670480 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.678211 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.678295 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.686029 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.689956 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.690049 kernel: Failed to create system directory rpcgss Jul 2 01:55:35.587000 audit[3499]: AVC avc: denied { confidentiality } for pid=3499 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:35.587000 audit[3499]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff96f93010 a1=5ef24 a2=aaaacae4e028 a3=aaaaff00e010 items=0 ppid=557 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.587000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 01:55:36.054334 kubelet[2006]: E0702 01:55:36.054244 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:36.060007 nfsidmap[3504]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-a-bbfd170fa1' Jul 2 01:55:36.063852 nfsidmap[3505]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-a-bbfd170fa1' Jul 2 01:55:36.076000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:36.076000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:36.076000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:36.076000 audit[1549]: AVC avc: denied { watch_reads } for pid=1549 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:36.076000 audit[1549]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaebbb9100 a2=10 a3=0 items=0 ppid=1 pid=1549 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.076000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 01:55:36.076000 audit[1549]: AVC avc: denied { watch_reads } for pid=1549 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:36.076000 audit[1549]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaebbb9100 a2=10 a3=0 items=0 ppid=1 pid=1549 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.076000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 01:55:36.076000 audit[1549]: AVC avc: denied { watch_reads } for pid=1549 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:36.076000 audit[1549]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaebbb9100 a2=10 a3=0 items=0 ppid=1 pid=1549 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.076000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 01:55:36.132216 env[1447]: time="2024-07-02T01:55:36.132160627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a341e897-d635-4be8-b074-ed2d4f0c7164,Namespace:default,Attempt:0,}" Jul 2 01:55:36.257621 systemd-networkd[1607]: cali5ec59c6bf6e: Link UP Jul 2 01:55:36.265092 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:55:36.265201 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 01:55:36.265557 systemd-networkd[1607]: cali5ec59c6bf6e: Gained carrier Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.192 [INFO][3510] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.45-k8s-test--pod--1-eth0 default a341e897-d635-4be8-b074-ed2d4f0c7164 1463 0 2024-07-02 01:55:02 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.45 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.192 [INFO][3510] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-eth0" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.217 [INFO][3521] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" HandleID="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Workload="10.200.20.45-k8s-test--pod--1-eth0" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.228 [INFO][3521] ipam_plugin.go 264: Auto assigning IP ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" HandleID="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Workload="10.200.20.45-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001169b0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.45", "pod":"test-pod-1", "timestamp":"2024-07-02 01:55:36.217382849 +0000 UTC"}, Hostname:"10.200.20.45", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.228 [INFO][3521] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.228 [INFO][3521] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.228 [INFO][3521] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.45' Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.230 [INFO][3521] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.233 [INFO][3521] ipam.go 372: Looking up existing affinities for host host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.236 [INFO][3521] ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.238 [INFO][3521] ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.239 [INFO][3521] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.239 [INFO][3521] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.241 [INFO][3521] ipam.go 1685: Creating new handle: k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7 Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.243 [INFO][3521] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.248 [INFO][3521] ipam.go 1216: Successfully claimed IPs: [192.168.126.196/26] block=192.168.126.192/26 handle="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.248 [INFO][3521] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.196/26] handle="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" host="10.200.20.45" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.248 [INFO][3521] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.249 [INFO][3521] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.126.196/26] IPv6=[] ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" HandleID="k8s-pod-network.86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Workload="10.200.20.45-k8s-test--pod--1-eth0" Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.250 [INFO][3510] k8s.go 386: Populated endpoint ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a341e897-d635-4be8-b074-ed2d4f0c7164", ResourceVersion:"1463", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 55, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:36.275564 env[1447]: 2024-07-02 01:55:36.250 [INFO][3510] k8s.go 387: Calico CNI using IPs: [192.168.126.196/32] ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-eth0" Jul 2 01:55:36.276173 env[1447]: 2024-07-02 01:55:36.250 [INFO][3510] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-eth0" Jul 2 01:55:36.276173 env[1447]: 2024-07-02 01:55:36.266 [INFO][3510] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-eth0" Jul 2 01:55:36.276173 env[1447]: 2024-07-02 01:55:36.266 [INFO][3510] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a341e897-d635-4be8-b074-ed2d4f0c7164", ResourceVersion:"1463", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 55, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c2:eb:6d:18:d4:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:36.276173 env[1447]: 2024-07-02 01:55:36.271 [INFO][3510] k8s.go 500: Wrote updated endpoint to datastore ContainerID="86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.45-k8s-test--pod--1-eth0" Jul 2 01:55:36.286000 audit[3542]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3542 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:55:36.286000 audit[3542]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffff0518e0 a2=0 a3=ffff90babfa8 items=0 ppid=2598 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.286000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:55:36.294335 env[1447]: time="2024-07-02T01:55:36.294245459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:55:36.294335 env[1447]: time="2024-07-02T01:55:36.294293940Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:55:36.294584 env[1447]: time="2024-07-02T01:55:36.294305301Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:55:36.294913 env[1447]: time="2024-07-02T01:55:36.294843320Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7 pid=3551 runtime=io.containerd.runc.v2 Jul 2 01:55:36.317113 systemd[1]: Started cri-containerd-86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7.scope. Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.330000 audit: BPF prog-id=106 op=LOAD Jul 2 01:55:36.331000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.331000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3551 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653436656535666538633039626133623163393834356535363866 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3551 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653436656535666538633039626133623163393834356535363866 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.332000 audit: BPF prog-id=107 op=LOAD Jul 2 01:55:36.332000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3551 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653436656535666538633039626133623163393834356535363866 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.333000 audit: BPF prog-id=108 op=LOAD Jul 2 01:55:36.333000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3551 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653436656535666538633039626133623163393834356535363866 Jul 2 01:55:36.334000 audit: BPF prog-id=108 op=UNLOAD Jul 2 01:55:36.334000 audit: BPF prog-id=107 op=UNLOAD Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.334000 audit: BPF prog-id=109 op=LOAD Jul 2 01:55:36.334000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3551 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653436656535666538633039626133623163393834356535363866 Jul 2 01:55:36.354681 env[1447]: time="2024-07-02T01:55:36.354638132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a341e897-d635-4be8-b074-ed2d4f0c7164,Namespace:default,Attempt:0,} returns sandbox id \"86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7\"" Jul 2 01:55:36.357027 env[1447]: time="2024-07-02T01:55:36.356985374Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 01:55:36.527394 update_engine[1434]: I0702 01:55:36.527340 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:55:36.527752 update_engine[1434]: I0702 01:55:36.527607 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:55:36.527804 update_engine[1434]: I0702 01:55:36.527779 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:55:36.536316 update_engine[1434]: E0702 01:55:36.536283 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:55:36.536458 update_engine[1434]: I0702 01:55:36.536394 1434 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jul 2 01:55:36.666710 env[1447]: time="2024-07-02T01:55:36.666583608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:36.673424 env[1447]: time="2024-07-02T01:55:36.672989872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:36.678205 env[1447]: time="2024-07-02T01:55:36.678151293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:36.682617 env[1447]: time="2024-07-02T01:55:36.682568247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:36.683627 env[1447]: time="2024-07-02T01:55:36.683582843Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653\"" Jul 2 01:55:36.686233 env[1447]: time="2024-07-02T01:55:36.686189814Z" level=info msg="CreateContainer within sandbox \"86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 01:55:36.717081 env[1447]: time="2024-07-02T01:55:36.717024773Z" level=info msg="CreateContainer within sandbox \"86e46ee5fe8c09ba3b1c9845e568f44cb25ae17b0af1764855500154ebbef6c7\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"f16a89494ddd0145ba155f6ce0f705f63e5b72a11ba90271cc152f2e4db50816\"" Jul 2 01:55:36.717856 env[1447]: time="2024-07-02T01:55:36.717825641Z" level=info msg="StartContainer for \"f16a89494ddd0145ba155f6ce0f705f63e5b72a11ba90271cc152f2e4db50816\"" Jul 2 01:55:36.733045 systemd[1]: Started cri-containerd-f16a89494ddd0145ba155f6ce0f705f63e5b72a11ba90271cc152f2e4db50816.scope. Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.747000 audit: BPF prog-id=110 op=LOAD Jul 2 01:55:36.747000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.747000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3551 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366138393439346464643031343562613135356636636530663730 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3551 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366138393439346464643031343562613135356636636530663730 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.748000 audit: BPF prog-id=111 op=LOAD Jul 2 01:55:36.748000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3551 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366138393439346464643031343562613135356636636530663730 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit: BPF prog-id=112 op=LOAD Jul 2 01:55:36.749000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3551 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366138393439346464643031343562613135356636636530663730 Jul 2 01:55:36.749000 audit: BPF prog-id=112 op=UNLOAD Jul 2 01:55:36.749000 audit: BPF prog-id=111 op=UNLOAD Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:36.749000 audit: BPF prog-id=113 op=LOAD Jul 2 01:55:36.749000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3551 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:36.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366138393439346464643031343562613135356636636530663730 Jul 2 01:55:36.769262 env[1447]: time="2024-07-02T01:55:36.769206319Z" level=info msg="StartContainer for \"f16a89494ddd0145ba155f6ce0f705f63e5b72a11ba90271cc152f2e4db50816\" returns successfully" Jul 2 01:55:37.054905 kubelet[2006]: E0702 01:55:37.054783 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:37.387710 kubelet[2006]: I0702 01:55:37.387402 2006 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.058979313 podStartE2EDuration="35.387343244s" podCreationTimestamp="2024-07-02 01:55:02 +0000 UTC" firstStartedPulling="2024-07-02 01:55:36.356253668 +0000 UTC m=+79.397311485" lastFinishedPulling="2024-07-02 01:55:36.684617599 +0000 UTC m=+79.725675416" observedRunningTime="2024-07-02 01:55:37.386918669 +0000 UTC m=+80.427976486" watchObservedRunningTime="2024-07-02 01:55:37.387343244 +0000 UTC m=+80.428401061" Jul 2 01:55:37.653551 systemd-networkd[1607]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 01:55:37.992177 kubelet[2006]: E0702 01:55:37.992061 2006 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:38.055468 kubelet[2006]: E0702 01:55:38.055414 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:39.056246 kubelet[2006]: E0702 01:55:39.056196 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:40.057437 kubelet[2006]: E0702 01:55:40.057329 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:41.057884 kubelet[2006]: E0702 01:55:41.057825 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:42.058099 kubelet[2006]: E0702 01:55:42.058064 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:43.059370 kubelet[2006]: E0702 01:55:43.059301 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:44.059571 kubelet[2006]: E0702 01:55:44.059533 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:45.060607 kubelet[2006]: E0702 01:55:45.060560 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:46.060709 kubelet[2006]: E0702 01:55:46.060652 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:46.527891 update_engine[1434]: I0702 01:55:46.527848 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:55:46.528225 update_engine[1434]: I0702 01:55:46.528059 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:55:46.528311 update_engine[1434]: I0702 01:55:46.528264 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:55:46.573822 update_engine[1434]: E0702 01:55:46.573789 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:55:46.573972 update_engine[1434]: I0702 01:55:46.573894 1434 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 01:55:46.573972 update_engine[1434]: I0702 01:55:46.573899 1434 omaha_request_action.cc:621] Omaha request response: Jul 2 01:55:46.574022 update_engine[1434]: E0702 01:55:46.573987 1434 omaha_request_action.cc:640] Omaha request network transfer failed. Jul 2 01:55:46.574022 update_engine[1434]: I0702 01:55:46.573999 1434 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jul 2 01:55:46.574022 update_engine[1434]: I0702 01:55:46.574002 1434 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 01:55:46.574022 update_engine[1434]: I0702 01:55:46.574005 1434 update_attempter.cc:306] Processing Done. Jul 2 01:55:46.574022 update_engine[1434]: E0702 01:55:46.574018 1434 update_attempter.cc:619] Update failed. Jul 2 01:55:46.574022 update_engine[1434]: I0702 01:55:46.574021 1434 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jul 2 01:55:46.574148 update_engine[1434]: I0702 01:55:46.574024 1434 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jul 2 01:55:46.574148 update_engine[1434]: I0702 01:55:46.574028 1434 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jul 2 01:55:46.574148 update_engine[1434]: I0702 01:55:46.574097 1434 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 01:55:46.574148 update_engine[1434]: I0702 01:55:46.574115 1434 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 01:55:46.574148 update_engine[1434]: I0702 01:55:46.574118 1434 omaha_request_action.cc:271] Request: Jul 2 01:55:46.574148 update_engine[1434]: Jul 2 01:55:46.574148 update_engine[1434]: Jul 2 01:55:46.574148 update_engine[1434]: Jul 2 01:55:46.574148 update_engine[1434]: Jul 2 01:55:46.574148 update_engine[1434]: Jul 2 01:55:46.574148 update_engine[1434]: Jul 2 01:55:46.574148 update_engine[1434]: I0702 01:55:46.574122 1434 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:55:46.574415 update_engine[1434]: I0702 01:55:46.574244 1434 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:55:46.574443 update_engine[1434]: I0702 01:55:46.574429 1434 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:55:46.574771 locksmithd[1519]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jul 2 01:55:46.607965 update_engine[1434]: E0702 01:55:46.607929 1434 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:55:46.608091 update_engine[1434]: I0702 01:55:46.608038 1434 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 01:55:46.608091 update_engine[1434]: I0702 01:55:46.608045 1434 omaha_request_action.cc:621] Omaha request response: Jul 2 01:55:46.608091 update_engine[1434]: I0702 01:55:46.608050 1434 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 01:55:46.608091 update_engine[1434]: I0702 01:55:46.608053 1434 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 01:55:46.608091 update_engine[1434]: I0702 01:55:46.608057 1434 update_attempter.cc:306] Processing Done. Jul 2 01:55:46.608091 update_engine[1434]: I0702 01:55:46.608060 1434 update_attempter.cc:310] Error event sent. Jul 2 01:55:46.608091 update_engine[1434]: I0702 01:55:46.608068 1434 update_check_scheduler.cc:74] Next update check in 44m43s Jul 2 01:55:46.608412 locksmithd[1519]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jul 2 01:55:47.061664 kubelet[2006]: E0702 01:55:47.061617 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:48.061940 kubelet[2006]: E0702 01:55:48.061903 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:49.062417 kubelet[2006]: E0702 01:55:49.062383 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:50.063188 kubelet[2006]: E0702 01:55:50.063149 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:51.064312 kubelet[2006]: E0702 01:55:51.064282 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:52.065065 kubelet[2006]: E0702 01:55:52.065028 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:53.066141 kubelet[2006]: E0702 01:55:53.066107 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:54.067584 kubelet[2006]: E0702 01:55:54.067554 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:55.068345 kubelet[2006]: E0702 01:55:55.068308 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:55.298246 kubelet[2006]: E0702 01:55:55.298212 2006 controller.go:195] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.39:33818->10.200.20.13:2379: read: connection timed out" Jul 2 01:55:56.069148 kubelet[2006]: E0702 01:55:56.069112 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:57.069582 kubelet[2006]: E0702 01:55:57.069548 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:57.992374 kubelet[2006]: E0702 01:55:57.992333 2006 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:58.070044 kubelet[2006]: E0702 01:55:58.070012 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:59.070841 kubelet[2006]: E0702 01:55:59.070795 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:00.071424 kubelet[2006]: E0702 01:56:00.071388 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:01.071810 kubelet[2006]: E0702 01:56:01.071776 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:02.072586 kubelet[2006]: E0702 01:56:02.072547 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:03.072948 kubelet[2006]: E0702 01:56:03.072914 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:04.074238 kubelet[2006]: E0702 01:56:04.074206 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:05.075754 kubelet[2006]: E0702 01:56:05.075718 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:05.298659 kubelet[2006]: E0702 01:56:05.298628 2006 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:06.076234 kubelet[2006]: E0702 01:56:06.076184 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:07.076976 kubelet[2006]: E0702 01:56:07.076936 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:08.077387 kubelet[2006]: E0702 01:56:08.077335 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:09.077493 kubelet[2006]: E0702 01:56:09.077463 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:10.078162 kubelet[2006]: E0702 01:56:10.078125 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:11.079305 kubelet[2006]: E0702 01:56:11.079270 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:12.080032 kubelet[2006]: E0702 01:56:12.079985 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:13.081072 kubelet[2006]: E0702 01:56:13.081041 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:14.081804 kubelet[2006]: E0702 01:56:14.081772 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:15.083030 kubelet[2006]: E0702 01:56:15.082998 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:15.299100 kubelet[2006]: E0702 01:56:15.299044 2006 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:16.083764 kubelet[2006]: E0702 01:56:16.083724 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:17.084682 kubelet[2006]: E0702 01:56:17.084651 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:17.992688 kubelet[2006]: E0702 01:56:17.992656 2006 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:18.085900 kubelet[2006]: E0702 01:56:18.085867 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:19.087364 kubelet[2006]: E0702 01:56:19.087326 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:20.087849 kubelet[2006]: E0702 01:56:20.087821 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:21.089064 kubelet[2006]: E0702 01:56:21.089031 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:22.090533 kubelet[2006]: E0702 01:56:22.090500 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:23.091471 kubelet[2006]: E0702 01:56:23.091433 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:24.092364 kubelet[2006]: E0702 01:56:24.092318 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:25.093259 kubelet[2006]: E0702 01:56:25.093222 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:25.299451 kubelet[2006]: E0702 01:56:25.299413 2006 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:26.093880 kubelet[2006]: E0702 01:56:26.093839 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:27.094969 kubelet[2006]: E0702 01:56:27.094936 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:28.096469 kubelet[2006]: E0702 01:56:28.096426 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:29.097450 kubelet[2006]: E0702 01:56:29.097417 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:30.098454 kubelet[2006]: E0702 01:56:30.098405 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:30.582470 kubelet[2006]: E0702 01:56:30.582436 2006 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"10.200.20.45\": Get \"https://10.200.20.39:6443/api/v1/nodes/10.200.20.45?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:31.098578 kubelet[2006]: E0702 01:56:31.098533 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:32.098772 kubelet[2006]: E0702 01:56:32.098742 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:33.099507 kubelet[2006]: E0702 01:56:33.099470 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:34.100273 kubelet[2006]: E0702 01:56:34.100240 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:35.101198 kubelet[2006]: E0702 01:56:35.101166 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:35.300298 kubelet[2006]: E0702 01:56:35.300268 2006 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:35.300490 kubelet[2006]: I0702 01:56:35.300477 2006 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Jul 2 01:56:36.102154 kubelet[2006]: E0702 01:56:36.102083 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:37.103079 kubelet[2006]: E0702 01:56:37.103042 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:37.991833 kubelet[2006]: E0702 01:56:37.991801 2006 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:38.103169 kubelet[2006]: E0702 01:56:38.103144 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:39.104133 kubelet[2006]: E0702 01:56:39.104101 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:40.105010 kubelet[2006]: E0702 01:56:40.104975 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:40.582989 kubelet[2006]: E0702 01:56:40.582961 2006 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"10.200.20.45\": Get \"https://10.200.20.39:6443/api/v1/nodes/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:41.033266 systemd[1]: run-containerd-runc-k8s.io-a73cfb52b610a0480dd2d5d7b291f798b291ab98213df3e23cb33d0fcf21913f-runc.M0A30e.mount: Deactivated successfully. Jul 2 01:56:41.105716 kubelet[2006]: E0702 01:56:41.105683 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:42.107056 kubelet[2006]: E0702 01:56:42.107017 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:43.107510 kubelet[2006]: E0702 01:56:43.107471 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:44.108178 kubelet[2006]: E0702 01:56:44.108146 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:45.109071 kubelet[2006]: E0702 01:56:45.109039 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:45.301384 kubelet[2006]: E0702 01:56:45.301335 2006 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Jul 2 01:56:46.110475 kubelet[2006]: E0702 01:56:46.110430 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:47.110993 kubelet[2006]: E0702 01:56:47.110957 2006 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"