Jul 2 01:52:19.998065 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 01:52:19.998083 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 01:52:19.998091 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Jul 2 01:52:19.998098 kernel: printk: bootconsole [pl11] enabled Jul 2 01:52:19.998102 kernel: efi: EFI v2.70 by EDK II Jul 2 01:52:19.998108 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef2e698 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Jul 2 01:52:19.998114 kernel: random: crng init done Jul 2 01:52:19.998120 kernel: ACPI: Early table checksum verification disabled Jul 2 01:52:19.998125 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Jul 2 01:52:19.998130 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998136 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998142 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Jul 2 01:52:19.998147 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998153 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998160 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998165 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998171 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998178 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998183 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Jul 2 01:52:19.998189 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:52:19.998194 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Jul 2 01:52:19.998200 kernel: NUMA: Failed to initialise from firmware Jul 2 01:52:19.998206 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:52:19.998211 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Jul 2 01:52:19.998217 kernel: Zone ranges: Jul 2 01:52:19.998223 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Jul 2 01:52:19.998228 kernel: DMA32 empty Jul 2 01:52:19.998235 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:52:19.998240 kernel: Movable zone start for each node Jul 2 01:52:19.998246 kernel: Early memory node ranges Jul 2 01:52:19.998252 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Jul 2 01:52:19.998257 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Jul 2 01:52:19.998263 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Jul 2 01:52:19.998268 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Jul 2 01:52:19.998274 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Jul 2 01:52:19.998279 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Jul 2 01:52:19.998285 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Jul 2 01:52:19.998291 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Jul 2 01:52:19.998296 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:52:19.998303 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:52:19.998311 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Jul 2 01:52:19.998318 kernel: psci: probing for conduit method from ACPI. Jul 2 01:52:19.998324 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 01:52:19.998330 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 01:52:19.998337 kernel: psci: MIGRATE_INFO_TYPE not supported. Jul 2 01:52:19.998343 kernel: psci: SMC Calling Convention v1.4 Jul 2 01:52:19.998349 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Jul 2 01:52:19.998355 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Jul 2 01:52:19.998361 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 01:52:19.998367 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 01:52:19.998374 kernel: pcpu-alloc: [0] 0 [0] 1 Jul 2 01:52:19.998380 kernel: Detected PIPT I-cache on CPU0 Jul 2 01:52:19.998386 kernel: CPU features: detected: GIC system register CPU interface Jul 2 01:52:19.998392 kernel: CPU features: detected: Hardware dirty bit management Jul 2 01:52:19.998397 kernel: CPU features: detected: Spectre-BHB Jul 2 01:52:19.998403 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 01:52:19.998410 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 01:52:19.998416 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 01:52:19.998422 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Jul 2 01:52:19.998437 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Jul 2 01:52:19.998443 kernel: Policy zone: Normal Jul 2 01:52:19.998451 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:52:19.998458 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 01:52:19.998863 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 01:52:19.998874 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 01:52:19.998880 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 01:52:19.998890 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Jul 2 01:52:19.998897 kernel: Memory: 3990260K/4194160K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 203900K reserved, 0K cma-reserved) Jul 2 01:52:19.998907 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 01:52:19.998913 kernel: trace event string verifier disabled Jul 2 01:52:19.998919 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 01:52:19.998926 kernel: rcu: RCU event tracing is enabled. Jul 2 01:52:19.998932 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 01:52:19.998938 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 01:52:19.998944 kernel: Tracing variant of Tasks RCU enabled. Jul 2 01:52:19.998950 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 01:52:19.998957 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 01:52:19.998968 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 01:52:19.998974 kernel: GICv3: 960 SPIs implemented Jul 2 01:52:19.998980 kernel: GICv3: 0 Extended SPIs implemented Jul 2 01:52:19.998986 kernel: GICv3: Distributor has no Range Selector support Jul 2 01:52:19.998992 kernel: Root IRQ handler: gic_handle_irq Jul 2 01:52:19.998998 kernel: GICv3: 16 PPIs implemented Jul 2 01:52:19.999004 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Jul 2 01:52:19.999010 kernel: ITS: No ITS available, not enabling LPIs Jul 2 01:52:19.999016 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:52:19.999025 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 01:52:19.999032 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 01:52:19.999038 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 01:52:19.999046 kernel: Console: colour dummy device 80x25 Jul 2 01:52:19.999056 kernel: printk: console [tty1] enabled Jul 2 01:52:19.999063 kernel: ACPI: Core revision 20210730 Jul 2 01:52:19.999069 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 01:52:19.999075 kernel: pid_max: default: 32768 minimum: 301 Jul 2 01:52:19.999084 kernel: LSM: Security Framework initializing Jul 2 01:52:19.999091 kernel: SELinux: Initializing. Jul 2 01:52:19.999097 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:52:19.999104 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:52:19.999114 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Jul 2 01:52:19.999121 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Jul 2 01:52:19.999127 kernel: rcu: Hierarchical SRCU implementation. Jul 2 01:52:19.999133 kernel: Remapping and enabling EFI services. Jul 2 01:52:19.999142 kernel: smp: Bringing up secondary CPUs ... Jul 2 01:52:19.999149 kernel: Detected PIPT I-cache on CPU1 Jul 2 01:52:19.999155 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Jul 2 01:52:19.999164 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:52:19.999171 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 01:52:19.999179 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 01:52:19.999186 kernel: SMP: Total of 2 processors activated. Jul 2 01:52:19.999193 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 01:52:19.999202 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Jul 2 01:52:19.999209 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 01:52:19.999215 kernel: CPU features: detected: CRC32 instructions Jul 2 01:52:19.999221 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 01:52:19.999228 kernel: CPU features: detected: LSE atomic instructions Jul 2 01:52:19.999238 kernel: CPU features: detected: Privileged Access Never Jul 2 01:52:19.999246 kernel: CPU: All CPU(s) started at EL1 Jul 2 01:52:19.999252 kernel: alternatives: patching kernel code Jul 2 01:52:19.999263 kernel: devtmpfs: initialized Jul 2 01:52:19.999276 kernel: KASLR enabled Jul 2 01:52:19.999282 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 01:52:19.999289 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 01:52:19.999299 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 01:52:19.999306 kernel: SMBIOS 3.1.0 present. Jul 2 01:52:19.999315 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Jul 2 01:52:19.999323 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 01:52:19.999332 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 01:52:19.999342 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 01:52:19.999349 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 01:52:19.999355 kernel: audit: initializing netlink subsys (disabled) Jul 2 01:52:19.999362 kernel: audit: type=2000 audit(0.084:1): state=initialized audit_enabled=0 res=1 Jul 2 01:52:19.999368 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 01:52:19.999375 kernel: cpuidle: using governor menu Jul 2 01:52:19.999383 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 01:52:19.999390 kernel: ASID allocator initialised with 32768 entries Jul 2 01:52:19.999396 kernel: ACPI: bus type PCI registered Jul 2 01:52:19.999403 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 01:52:19.999409 kernel: Serial: AMBA PL011 UART driver Jul 2 01:52:19.999416 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 01:52:19.999422 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 01:52:19.999429 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 01:52:19.999436 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 01:52:19.999443 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 01:52:19.999450 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 01:52:19.999456 kernel: ACPI: Added _OSI(Module Device) Jul 2 01:52:19.999471 kernel: ACPI: Added _OSI(Processor Device) Jul 2 01:52:19.999477 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 01:52:19.999484 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 01:52:19.999490 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 01:52:19.999497 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 01:52:19.999504 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 01:52:19.999512 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 01:52:19.999519 kernel: ACPI: Interpreter enabled Jul 2 01:52:19.999525 kernel: ACPI: Using GIC for interrupt routing Jul 2 01:52:19.999532 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Jul 2 01:52:19.999539 kernel: printk: console [ttyAMA0] enabled Jul 2 01:52:19.999545 kernel: printk: bootconsole [pl11] disabled Jul 2 01:52:19.999553 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Jul 2 01:52:19.999560 kernel: iommu: Default domain type: Translated Jul 2 01:52:19.999566 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 01:52:19.999574 kernel: vgaarb: loaded Jul 2 01:52:19.999581 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 01:52:19.999588 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 01:52:19.999594 kernel: PTP clock support registered Jul 2 01:52:19.999601 kernel: Registered efivars operations Jul 2 01:52:19.999607 kernel: No ACPI PMU IRQ for CPU0 Jul 2 01:52:19.999614 kernel: No ACPI PMU IRQ for CPU1 Jul 2 01:52:19.999620 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 01:52:19.999627 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 01:52:19.999634 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 01:52:19.999641 kernel: pnp: PnP ACPI init Jul 2 01:52:19.999647 kernel: pnp: PnP ACPI: found 0 devices Jul 2 01:52:19.999653 kernel: NET: Registered PF_INET protocol family Jul 2 01:52:19.999660 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 01:52:19.999666 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 01:52:19.999673 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 01:52:19.999680 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 01:52:19.999687 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 01:52:19.999694 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 01:52:19.999701 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:52:19.999708 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:52:19.999715 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 01:52:19.999721 kernel: PCI: CLS 0 bytes, default 64 Jul 2 01:52:19.999728 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Jul 2 01:52:19.999735 kernel: kvm [1]: HYP mode not available Jul 2 01:52:19.999741 kernel: Initialise system trusted keyrings Jul 2 01:52:19.999748 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 01:52:19.999756 kernel: Key type asymmetric registered Jul 2 01:52:19.999762 kernel: Asymmetric key parser 'x509' registered Jul 2 01:52:19.999769 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 01:52:19.999776 kernel: io scheduler mq-deadline registered Jul 2 01:52:19.999782 kernel: io scheduler kyber registered Jul 2 01:52:19.999789 kernel: io scheduler bfq registered Jul 2 01:52:19.999796 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 01:52:19.999802 kernel: thunder_xcv, ver 1.0 Jul 2 01:52:19.999809 kernel: thunder_bgx, ver 1.0 Jul 2 01:52:19.999816 kernel: nicpf, ver 1.0 Jul 2 01:52:19.999823 kernel: nicvf, ver 1.0 Jul 2 01:52:19.999955 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 01:52:20.000016 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T01:52:19 UTC (1719885139) Jul 2 01:52:20.000025 kernel: efifb: probing for efifb Jul 2 01:52:20.000032 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Jul 2 01:52:20.000039 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Jul 2 01:52:20.000045 kernel: efifb: scrolling: redraw Jul 2 01:52:20.000054 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 01:52:20.000061 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:52:20.000067 kernel: fb0: EFI VGA frame buffer device Jul 2 01:52:20.000074 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Jul 2 01:52:20.000081 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 01:52:20.000087 kernel: NET: Registered PF_INET6 protocol family Jul 2 01:52:20.000094 kernel: Segment Routing with IPv6 Jul 2 01:52:20.000100 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 01:52:20.000107 kernel: NET: Registered PF_PACKET protocol family Jul 2 01:52:20.000115 kernel: Key type dns_resolver registered Jul 2 01:52:20.000121 kernel: registered taskstats version 1 Jul 2 01:52:20.000128 kernel: Loading compiled-in X.509 certificates Jul 2 01:52:20.000135 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 01:52:20.000141 kernel: Key type .fscrypt registered Jul 2 01:52:20.000148 kernel: Key type fscrypt-provisioning registered Jul 2 01:52:20.000154 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 01:52:20.000161 kernel: ima: Allocated hash algorithm: sha1 Jul 2 01:52:20.000167 kernel: ima: No architecture policies found Jul 2 01:52:20.000176 kernel: clk: Disabling unused clocks Jul 2 01:52:20.000182 kernel: Freeing unused kernel memory: 36352K Jul 2 01:52:20.000189 kernel: Run /init as init process Jul 2 01:52:20.000195 kernel: with arguments: Jul 2 01:52:20.000202 kernel: /init Jul 2 01:52:20.000208 kernel: with environment: Jul 2 01:52:20.000214 kernel: HOME=/ Jul 2 01:52:20.000221 kernel: TERM=linux Jul 2 01:52:20.000227 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 01:52:20.000236 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:52:20.000246 systemd[1]: Detected virtualization microsoft. Jul 2 01:52:20.000254 systemd[1]: Detected architecture arm64. Jul 2 01:52:20.000261 systemd[1]: Running in initrd. Jul 2 01:52:20.000268 systemd[1]: No hostname configured, using default hostname. Jul 2 01:52:20.000276 systemd[1]: Hostname set to . Jul 2 01:52:20.000283 systemd[1]: Initializing machine ID from random generator. Jul 2 01:52:20.000292 systemd[1]: Queued start job for default target initrd.target. Jul 2 01:52:20.000299 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:52:20.000307 systemd[1]: Reached target cryptsetup.target. Jul 2 01:52:20.000314 systemd[1]: Reached target paths.target. Jul 2 01:52:20.000321 systemd[1]: Reached target slices.target. Jul 2 01:52:20.000329 systemd[1]: Reached target swap.target. Jul 2 01:52:20.000336 systemd[1]: Reached target timers.target. Jul 2 01:52:20.000344 systemd[1]: Listening on iscsid.socket. Jul 2 01:52:20.000352 systemd[1]: Listening on iscsiuio.socket. Jul 2 01:52:20.000360 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 01:52:20.000368 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 01:52:20.000376 systemd[1]: Listening on systemd-journald.socket. Jul 2 01:52:20.000384 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:52:20.000392 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:52:20.000400 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:52:20.000407 systemd[1]: Reached target sockets.target. Jul 2 01:52:20.000415 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:52:20.000423 systemd[1]: Finished network-cleanup.service. Jul 2 01:52:20.000431 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 01:52:20.000438 systemd[1]: Starting systemd-journald.service... Jul 2 01:52:20.000446 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:52:20.000453 systemd[1]: Starting systemd-resolved.service... Jul 2 01:52:20.000460 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 01:52:20.000488 systemd-journald[275]: Journal started Jul 2 01:52:20.000529 systemd-journald[275]: Runtime Journal (/run/log/journal/f3ff35738a5d4b4b919bcc9307fa1944) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:52:19.980753 systemd-modules-load[276]: Inserted module 'overlay' Jul 2 01:52:20.023898 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 01:52:20.012056 systemd-resolved[277]: Positive Trust Anchors: Jul 2 01:52:20.042458 kernel: Bridge firewalling registered Jul 2 01:52:20.042486 systemd[1]: Started systemd-journald.service. Jul 2 01:52:20.042498 kernel: SCSI subsystem initialized Jul 2 01:52:20.012063 systemd-resolved[277]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:52:20.086410 kernel: audit: type=1130 audit(1719885140.057:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.086434 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 01:52:20.086444 kernel: device-mapper: uevent: version 1.0.3 Jul 2 01:52:20.086452 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 01:52:20.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.012091 systemd-resolved[277]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:52:20.143312 kernel: audit: type=1130 audit(1719885140.109:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.014116 systemd-resolved[277]: Defaulting to hostname 'linux'. Jul 2 01:52:20.166856 kernel: audit: type=1130 audit(1719885140.147:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.028487 systemd-modules-load[276]: Inserted module 'br_netfilter' Jul 2 01:52:20.057317 systemd[1]: Started systemd-resolved.service. Jul 2 01:52:20.226281 kernel: audit: type=1130 audit(1719885140.176:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.226304 kernel: audit: type=1130 audit(1719885140.199:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.107548 systemd-modules-load[276]: Inserted module 'dm_multipath' Jul 2 01:52:20.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.109917 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:52:20.254000 kernel: audit: type=1130 audit(1719885140.230:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.167855 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 01:52:20.177246 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:52:20.200022 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 01:52:20.231334 systemd[1]: Reached target nss-lookup.target. Jul 2 01:52:20.257768 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 01:52:20.265913 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:52:20.276176 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:52:20.344252 kernel: audit: type=1130 audit(1719885140.302:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.344282 kernel: audit: type=1130 audit(1719885140.302:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.294577 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 01:52:20.302477 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:52:20.375996 kernel: audit: type=1130 audit(1719885140.356:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.376657 dracut-cmdline[298]: dracut-dracut-053 Jul 2 01:52:20.322160 systemd[1]: Starting dracut-cmdline.service... Jul 2 01:52:20.346800 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:52:20.389044 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:52:20.448586 kernel: Loading iSCSI transport class v2.0-870. Jul 2 01:52:20.460491 kernel: iscsi: registered transport (tcp) Jul 2 01:52:20.481585 kernel: iscsi: registered transport (qla4xxx) Jul 2 01:52:20.481638 kernel: QLogic iSCSI HBA Driver Jul 2 01:52:20.511218 systemd[1]: Finished dracut-cmdline.service. Jul 2 01:52:20.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.516746 systemd[1]: Starting dracut-pre-udev.service... Jul 2 01:52:20.568483 kernel: raid6: neonx8 gen() 13816 MB/s Jul 2 01:52:20.588477 kernel: raid6: neonx8 xor() 10840 MB/s Jul 2 01:52:20.610476 kernel: raid6: neonx4 gen() 13555 MB/s Jul 2 01:52:20.631478 kernel: raid6: neonx4 xor() 11003 MB/s Jul 2 01:52:20.651478 kernel: raid6: neonx2 gen() 12969 MB/s Jul 2 01:52:20.673474 kernel: raid6: neonx2 xor() 10456 MB/s Jul 2 01:52:20.693477 kernel: raid6: neonx1 gen() 10560 MB/s Jul 2 01:52:20.713478 kernel: raid6: neonx1 xor() 8781 MB/s Jul 2 01:52:20.735479 kernel: raid6: int64x8 gen() 6270 MB/s Jul 2 01:52:20.756474 kernel: raid6: int64x8 xor() 3545 MB/s Jul 2 01:52:20.776477 kernel: raid6: int64x4 gen() 7220 MB/s Jul 2 01:52:20.798480 kernel: raid6: int64x4 xor() 3845 MB/s Jul 2 01:52:20.818477 kernel: raid6: int64x2 gen() 6155 MB/s Jul 2 01:52:20.838473 kernel: raid6: int64x2 xor() 3324 MB/s Jul 2 01:52:20.859479 kernel: raid6: int64x1 gen() 5044 MB/s Jul 2 01:52:20.883335 kernel: raid6: int64x1 xor() 2647 MB/s Jul 2 01:52:20.883353 kernel: raid6: using algorithm neonx8 gen() 13816 MB/s Jul 2 01:52:20.883369 kernel: raid6: .... xor() 10840 MB/s, rmw enabled Jul 2 01:52:20.887399 kernel: raid6: using neon recovery algorithm Jul 2 01:52:20.908830 kernel: xor: measuring software checksum speed Jul 2 01:52:20.908852 kernel: 8regs : 17289 MB/sec Jul 2 01:52:20.912762 kernel: 32regs : 20760 MB/sec Jul 2 01:52:20.916642 kernel: arm64_neon : 27920 MB/sec Jul 2 01:52:20.916655 kernel: xor: using function: arm64_neon (27920 MB/sec) Jul 2 01:52:20.976489 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 01:52:20.985574 systemd[1]: Finished dracut-pre-udev.service. Jul 2 01:52:20.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:20.993000 audit: BPF prog-id=7 op=LOAD Jul 2 01:52:20.993000 audit: BPF prog-id=8 op=LOAD Jul 2 01:52:20.994099 systemd[1]: Starting systemd-udevd.service... Jul 2 01:52:21.011629 systemd-udevd[474]: Using default interface naming scheme 'v252'. Jul 2 01:52:21.018417 systemd[1]: Started systemd-udevd.service. Jul 2 01:52:21.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.028225 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 01:52:21.041318 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Jul 2 01:52:21.072238 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 01:52:21.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.077702 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:52:21.110586 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:52:21.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:21.164620 kernel: hv_vmbus: Vmbus version:5.3 Jul 2 01:52:21.193822 kernel: hv_vmbus: registering driver hyperv_keyboard Jul 2 01:52:21.193869 kernel: hv_vmbus: registering driver hid_hyperv Jul 2 01:52:21.193879 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Jul 2 01:52:21.193889 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Jul 2 01:52:21.209471 kernel: hv_vmbus: registering driver hv_storvsc Jul 2 01:52:21.209511 kernel: hv_vmbus: registering driver hv_netvsc Jul 2 01:52:21.209520 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Jul 2 01:52:21.221014 kernel: scsi host0: storvsc_host_t Jul 2 01:52:21.227614 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Jul 2 01:52:21.230992 kernel: scsi host1: storvsc_host_t Jul 2 01:52:21.231482 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Jul 2 01:52:21.265677 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Jul 2 01:52:21.265886 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 01:52:21.276406 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Jul 2 01:52:21.276591 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 01:52:21.276695 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Jul 2 01:52:21.276779 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 01:52:21.286746 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Jul 2 01:52:21.286888 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Jul 2 01:52:21.293483 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:21.297476 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 01:52:21.318491 kernel: hv_netvsc 000d3a07-155d-000d-3a07-155d000d3a07 eth0: VF slot 1 added Jul 2 01:52:21.326482 kernel: hv_vmbus: registering driver hv_pci Jul 2 01:52:21.333476 kernel: hv_pci 2b13f255-fdc0-4a08-975f-1700ea0ded3b: PCI VMBus probing: Using version 0x10004 Jul 2 01:52:21.349229 kernel: hv_pci 2b13f255-fdc0-4a08-975f-1700ea0ded3b: PCI host bridge to bus fdc0:00 Jul 2 01:52:21.349382 kernel: pci_bus fdc0:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Jul 2 01:52:21.355366 kernel: pci_bus fdc0:00: No busn resource found for root bus, will use [bus 00-ff] Jul 2 01:52:21.362722 kernel: pci fdc0:00:02.0: [15b3:1018] type 00 class 0x020000 Jul 2 01:52:21.375262 kernel: pci fdc0:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:52:21.395580 kernel: pci fdc0:00:02.0: enabling Extended Tags Jul 2 01:52:21.422596 kernel: pci fdc0:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at fdc0:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Jul 2 01:52:21.435845 kernel: pci_bus fdc0:00: busn_res: [bus 00-ff] end is updated to 00 Jul 2 01:52:21.436049 kernel: pci fdc0:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:52:21.475489 kernel: mlx5_core fdc0:00:02.0: firmware version: 16.30.1284 Jul 2 01:52:21.629561 kernel: mlx5_core fdc0:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Jul 2 01:52:21.672831 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 01:52:21.695170 kernel: hv_netvsc 000d3a07-155d-000d-3a07-155d000d3a07 eth0: VF registering: eth1 Jul 2 01:52:21.695346 kernel: mlx5_core fdc0:00:02.0 eth1: joined to eth0 Jul 2 01:52:21.704488 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (537) Jul 2 01:52:21.710478 kernel: mlx5_core fdc0:00:02.0 enP64960s1: renamed from eth1 Jul 2 01:52:21.718539 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:52:21.894431 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 01:52:21.901032 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 01:52:21.908454 systemd[1]: Starting disk-uuid.service... Jul 2 01:52:21.921269 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 01:52:21.946494 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:21.953477 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:22.965269 disk-uuid[598]: The operation has completed successfully. Jul 2 01:52:22.970271 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:52:23.020749 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 01:52:23.021602 systemd[1]: Finished disk-uuid.service. Jul 2 01:52:23.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.038429 systemd[1]: Starting verity-setup.service... Jul 2 01:52:23.080486 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 01:52:23.371664 systemd[1]: Found device dev-mapper-usr.device. Jul 2 01:52:23.381686 systemd[1]: Mounting sysusr-usr.mount... Jul 2 01:52:23.385261 systemd[1]: Finished verity-setup.service. Jul 2 01:52:23.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.444509 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 01:52:23.444660 systemd[1]: Mounted sysusr-usr.mount. Jul 2 01:52:23.448597 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 01:52:23.449309 systemd[1]: Starting ignition-setup.service... Jul 2 01:52:23.462268 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 01:52:23.496771 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:52:23.496814 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:52:23.501673 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:52:23.548380 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 01:52:23.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.556000 audit: BPF prog-id=9 op=LOAD Jul 2 01:52:23.557977 systemd[1]: Starting systemd-networkd.service... Jul 2 01:52:23.578309 systemd-networkd[866]: lo: Link UP Jul 2 01:52:23.578320 systemd-networkd[866]: lo: Gained carrier Jul 2 01:52:23.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.578727 systemd-networkd[866]: Enumeration completed Jul 2 01:52:23.581636 systemd[1]: Started systemd-networkd.service. Jul 2 01:52:23.581943 systemd-networkd[866]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:52:23.586536 systemd[1]: Reached target network.target. Jul 2 01:52:23.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.597578 systemd[1]: Starting iscsiuio.service... Jul 2 01:52:23.629025 iscsid[875]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:52:23.629025 iscsid[875]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 01:52:23.629025 iscsid[875]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 01:52:23.629025 iscsid[875]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 01:52:23.629025 iscsid[875]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 01:52:23.629025 iscsid[875]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:52:23.629025 iscsid[875]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 01:52:23.712173 kernel: mlx5_core fdc0:00:02.0 enP64960s1: Link up Jul 2 01:52:23.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.613811 systemd[1]: Started iscsiuio.service. Jul 2 01:52:23.618392 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 01:52:23.619368 systemd[1]: Starting iscsid.service... Jul 2 01:52:23.626564 systemd[1]: Started iscsid.service. Jul 2 01:52:23.639727 systemd[1]: Starting dracut-initqueue.service... Jul 2 01:52:23.689457 systemd[1]: Finished dracut-initqueue.service. Jul 2 01:52:23.766837 kernel: hv_netvsc 000d3a07-155d-000d-3a07-155d000d3a07 eth0: Data path switched to VF: enP64960s1 Jul 2 01:52:23.771655 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:23.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.705082 systemd[1]: Reached target remote-fs-pre.target. Jul 2 01:52:23.716579 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:52:23.724315 systemd[1]: Reached target remote-fs.target. Jul 2 01:52:23.735849 systemd[1]: Starting dracut-pre-mount.service... Jul 2 01:52:23.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:23.763117 systemd-networkd[866]: enP64960s1: Link UP Jul 2 01:52:23.763185 systemd-networkd[866]: eth0: Link UP Jul 2 01:52:23.763299 systemd-networkd[866]: eth0: Gained carrier Jul 2 01:52:23.767163 systemd[1]: Finished dracut-pre-mount.service. Jul 2 01:52:23.776858 systemd-networkd[866]: enP64960s1: Gained carrier Jul 2 01:52:23.789161 systemd[1]: Finished ignition-setup.service. Jul 2 01:52:23.794434 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 01:52:23.798548 systemd-networkd[866]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:52:25.550750 systemd-networkd[866]: eth0: Gained IPv6LL Jul 2 01:52:26.489508 ignition[890]: Ignition 2.14.0 Jul 2 01:52:26.489521 ignition[890]: Stage: fetch-offline Jul 2 01:52:26.489596 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:26.489621 ignition[890]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:26.569666 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:26.569802 ignition[890]: parsed url from cmdline: "" Jul 2 01:52:26.569805 ignition[890]: no config URL provided Jul 2 01:52:26.569810 ignition[890]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:52:26.585713 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 01:52:26.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.569817 ignition[890]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:52:26.625455 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 2 01:52:26.625487 kernel: audit: type=1130 audit(1719885146.595:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.569822 ignition[890]: failed to fetch config: resource requires networking Jul 2 01:52:26.607527 systemd[1]: Starting ignition-fetch.service... Jul 2 01:52:26.569918 ignition[890]: Ignition finished successfully Jul 2 01:52:26.614055 ignition[896]: Ignition 2.14.0 Jul 2 01:52:26.614061 ignition[896]: Stage: fetch Jul 2 01:52:26.614159 ignition[896]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:26.614177 ignition[896]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:26.616802 ignition[896]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:26.616921 ignition[896]: parsed url from cmdline: "" Jul 2 01:52:26.616925 ignition[896]: no config URL provided Jul 2 01:52:26.616929 ignition[896]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:52:26.616936 ignition[896]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:52:26.616961 ignition[896]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Jul 2 01:52:26.708264 ignition[896]: GET result: OK Jul 2 01:52:26.708327 ignition[896]: config has been read from IMDS userdata Jul 2 01:52:26.710297 unknown[896]: fetched base config from "system" Jul 2 01:52:26.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.708344 ignition[896]: parsing config with SHA512: 799678403aabb1fb47ab7f345895a866efd2a40e1bd99810f1cae7aa86147c69582f00d84cb4b08133836dc6f68765c949cc082bdff6c33323bebc9b86c6afb4 Jul 2 01:52:26.710304 unknown[896]: fetched base config from "system" Jul 2 01:52:26.744634 kernel: audit: type=1130 audit(1719885146.720:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.710689 ignition[896]: fetch: fetch complete Jul 2 01:52:26.710310 unknown[896]: fetched user config from "azure" Jul 2 01:52:26.710694 ignition[896]: fetch: fetch passed Jul 2 01:52:26.711874 systemd[1]: Finished ignition-fetch.service. Jul 2 01:52:26.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.710734 ignition[896]: Ignition finished successfully Jul 2 01:52:26.721630 systemd[1]: Starting ignition-kargs.service... Jul 2 01:52:26.793002 kernel: audit: type=1130 audit(1719885146.763:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.751393 ignition[902]: Ignition 2.14.0 Jul 2 01:52:26.826608 kernel: audit: type=1130 audit(1719885146.799:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.759332 systemd[1]: Finished ignition-kargs.service. Jul 2 01:52:26.751399 ignition[902]: Stage: kargs Jul 2 01:52:26.781586 systemd[1]: Starting ignition-disks.service... Jul 2 01:52:26.751511 ignition[902]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:26.795927 systemd[1]: Finished ignition-disks.service. Jul 2 01:52:26.751531 ignition[902]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:26.800263 systemd[1]: Reached target initrd-root-device.target. Jul 2 01:52:26.754022 ignition[902]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:26.826638 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:52:26.756988 ignition[902]: kargs: kargs passed Jul 2 01:52:26.830944 systemd[1]: Reached target local-fs.target. Jul 2 01:52:26.757041 ignition[902]: Ignition finished successfully Jul 2 01:52:26.838608 systemd[1]: Reached target sysinit.target. Jul 2 01:52:26.788033 ignition[908]: Ignition 2.14.0 Jul 2 01:52:26.845156 systemd[1]: Reached target basic.target. Jul 2 01:52:26.788039 ignition[908]: Stage: disks Jul 2 01:52:26.858360 systemd[1]: Starting systemd-fsck-root.service... Jul 2 01:52:26.788135 ignition[908]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:26.788156 ignition[908]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:26.791358 ignition[908]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:26.792648 ignition[908]: disks: disks passed Jul 2 01:52:26.792695 ignition[908]: Ignition finished successfully Jul 2 01:52:26.937423 systemd-fsck[916]: ROOT: clean, 614/7326000 files, 481075/7359488 blocks Jul 2 01:52:26.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.947786 systemd[1]: Finished systemd-fsck-root.service. Jul 2 01:52:26.972920 kernel: audit: type=1130 audit(1719885146.952:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:26.964826 systemd[1]: Mounting sysroot.mount... Jul 2 01:52:26.994142 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 01:52:26.990613 systemd[1]: Mounted sysroot.mount. Jul 2 01:52:26.995627 systemd[1]: Reached target initrd-root-fs.target. Jul 2 01:52:27.031832 systemd[1]: Mounting sysroot-usr.mount... Jul 2 01:52:27.036157 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 01:52:27.043092 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 01:52:27.043132 systemd[1]: Reached target ignition-diskful.target. Jul 2 01:52:27.053202 systemd[1]: Mounted sysroot-usr.mount. Jul 2 01:52:27.107972 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:52:27.112702 systemd[1]: Starting initrd-setup-root.service... Jul 2 01:52:27.140522 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (927) Jul 2 01:52:27.140562 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:52:27.140573 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:52:27.145127 initrd-setup-root[932]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 01:52:27.155778 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:52:27.158992 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:52:27.172345 initrd-setup-root[958]: cut: /sysroot/etc/group: No such file or directory Jul 2 01:52:27.198217 initrd-setup-root[966]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 01:52:27.207598 initrd-setup-root[974]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 01:52:27.747512 systemd[1]: Finished initrd-setup-root.service. Jul 2 01:52:27.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:27.776833 systemd[1]: Starting ignition-mount.service... Jul 2 01:52:27.787045 kernel: audit: type=1130 audit(1719885147.756:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:27.787596 systemd[1]: Starting sysroot-boot.service... Jul 2 01:52:27.791897 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 01:52:27.791993 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 01:52:27.815456 systemd[1]: Finished sysroot-boot.service. Jul 2 01:52:27.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:27.826028 ignition[996]: INFO : Ignition 2.14.0 Jul 2 01:52:27.826028 ignition[996]: INFO : Stage: mount Jul 2 01:52:27.826028 ignition[996]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:27.826028 ignition[996]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:27.885724 kernel: audit: type=1130 audit(1719885147.825:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:27.885748 kernel: audit: type=1130 audit(1719885147.845:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:27.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:27.885801 ignition[996]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:27.885801 ignition[996]: INFO : mount: mount passed Jul 2 01:52:27.885801 ignition[996]: INFO : Ignition finished successfully Jul 2 01:52:27.833790 systemd[1]: Finished ignition-mount.service. Jul 2 01:52:28.392506 coreos-metadata[926]: Jul 02 01:52:28.392 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 01:52:28.402049 coreos-metadata[926]: Jul 02 01:52:28.402 INFO Fetch successful Jul 2 01:52:28.440072 coreos-metadata[926]: Jul 02 01:52:28.440 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Jul 2 01:52:28.461843 coreos-metadata[926]: Jul 02 01:52:28.461 INFO Fetch successful Jul 2 01:52:28.478238 coreos-metadata[926]: Jul 02 01:52:28.478 INFO wrote hostname ci-3510.3.5-a-62a89fec45 to /sysroot/etc/hostname Jul 2 01:52:28.486585 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 01:52:28.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:28.492377 systemd[1]: Starting ignition-files.service... Jul 2 01:52:28.518495 kernel: audit: type=1130 audit(1719885148.491:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:28.521186 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:52:28.537499 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1006) Jul 2 01:52:28.537551 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:52:28.549329 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:52:28.549351 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:52:28.558884 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:52:28.575701 ignition[1025]: INFO : Ignition 2.14.0 Jul 2 01:52:28.579619 ignition[1025]: INFO : Stage: files Jul 2 01:52:28.584778 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:28.584778 ignition[1025]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:28.606343 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:28.606343 ignition[1025]: DEBUG : files: compiled without relabeling support, skipping Jul 2 01:52:28.619011 ignition[1025]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 01:52:28.619011 ignition[1025]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 01:52:28.679684 ignition[1025]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 01:52:28.687165 ignition[1025]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 01:52:28.703672 unknown[1025]: wrote ssh authorized keys file for user: core Jul 2 01:52:28.710541 ignition[1025]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:52:28.710541 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:52:28.821772 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1030) Jul 2 01:52:28.770658 systemd[1]: mnt-oem3327099234.mount: Deactivated successfully. Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3327099234" Jul 2 01:52:28.831065 ignition[1025]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3327099234": device or resource busy Jul 2 01:52:28.831065 ignition[1025]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3327099234", trying btrfs: device or resource busy Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3327099234" Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3327099234" Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3327099234" Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3327099234" Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2140137548" Jul 2 01:52:28.831065 ignition[1025]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2140137548": device or resource busy Jul 2 01:52:28.831065 ignition[1025]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2140137548", trying btrfs: device or resource busy Jul 2 01:52:28.831065 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2140137548" Jul 2 01:52:28.793787 systemd[1]: mnt-oem2140137548.mount: Deactivated successfully. Jul 2 01:52:28.985283 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2140137548" Jul 2 01:52:28.985283 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2140137548" Jul 2 01:52:28.985283 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2140137548" Jul 2 01:52:28.985283 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:52:28.985283 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:52:28.985283 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Jul 2 01:52:29.255531 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Jul 2 01:52:29.466273 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:52:29.466273 ignition[1025]: INFO : files: op(f): [started] processing unit "waagent.service" Jul 2 01:52:29.466273 ignition[1025]: INFO : files: op(f): [finished] processing unit "waagent.service" Jul 2 01:52:29.466273 ignition[1025]: INFO : files: op(10): [started] processing unit "nvidia.service" Jul 2 01:52:29.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.517278 ignition[1025]: INFO : files: op(10): [finished] processing unit "nvidia.service" Jul 2 01:52:29.517278 ignition[1025]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Jul 2 01:52:29.517278 ignition[1025]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Jul 2 01:52:29.517278 ignition[1025]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Jul 2 01:52:29.517278 ignition[1025]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Jul 2 01:52:29.517278 ignition[1025]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:52:29.517278 ignition[1025]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:52:29.517278 ignition[1025]: INFO : files: files passed Jul 2 01:52:29.517278 ignition[1025]: INFO : Ignition finished successfully Jul 2 01:52:29.597813 kernel: audit: type=1130 audit(1719885149.488:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.478445 systemd[1]: Finished ignition-files.service. Jul 2 01:52:29.491656 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 01:52:29.618678 initrd-setup-root-after-ignition[1050]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 01:52:29.521792 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 01:52:29.527706 systemd[1]: Starting ignition-quench.service... Jul 2 01:52:29.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.540615 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 01:52:29.540727 systemd[1]: Finished ignition-quench.service. Jul 2 01:52:29.566547 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 01:52:29.580816 systemd[1]: Reached target ignition-complete.target. Jul 2 01:52:29.603037 systemd[1]: Starting initrd-parse-etc.service... Jul 2 01:52:29.627551 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 01:52:29.627660 systemd[1]: Finished initrd-parse-etc.service. Jul 2 01:52:29.640734 systemd[1]: Reached target initrd-fs.target. Jul 2 01:52:29.648447 systemd[1]: Reached target initrd.target. Jul 2 01:52:29.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.657031 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 01:52:29.657843 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 01:52:29.692922 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 01:52:29.701534 systemd[1]: Starting initrd-cleanup.service... Jul 2 01:52:29.720185 systemd[1]: Stopped target nss-lookup.target. Jul 2 01:52:29.726765 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 01:52:29.735042 systemd[1]: Stopped target timers.target. Jul 2 01:52:29.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.742600 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 01:52:29.742676 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 01:52:29.750870 systemd[1]: Stopped target initrd.target. Jul 2 01:52:29.758305 systemd[1]: Stopped target basic.target. Jul 2 01:52:29.766749 systemd[1]: Stopped target ignition-complete.target. Jul 2 01:52:29.775205 systemd[1]: Stopped target ignition-diskful.target. Jul 2 01:52:29.783051 systemd[1]: Stopped target initrd-root-device.target. Jul 2 01:52:29.791069 systemd[1]: Stopped target remote-fs.target. Jul 2 01:52:29.799158 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 01:52:29.807808 systemd[1]: Stopped target sysinit.target. Jul 2 01:52:29.816226 systemd[1]: Stopped target local-fs.target. Jul 2 01:52:29.824344 systemd[1]: Stopped target local-fs-pre.target. Jul 2 01:52:29.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.832480 systemd[1]: Stopped target swap.target. Jul 2 01:52:29.840130 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 01:52:29.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.840196 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 01:52:29.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.847815 systemd[1]: Stopped target cryptsetup.target. Jul 2 01:52:29.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.856038 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 01:52:29.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.856091 systemd[1]: Stopped dracut-initqueue.service. Jul 2 01:52:29.863608 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 01:52:29.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.925508 iscsid[875]: iscsid shutting down. Jul 2 01:52:29.863643 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 01:52:29.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.939157 ignition[1063]: INFO : Ignition 2.14.0 Jul 2 01:52:29.939157 ignition[1063]: INFO : Stage: umount Jul 2 01:52:29.939157 ignition[1063]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:52:29.939157 ignition[1063]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:52:29.939157 ignition[1063]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:52:29.939157 ignition[1063]: INFO : umount: umount passed Jul 2 01:52:29.939157 ignition[1063]: INFO : Ignition finished successfully Jul 2 01:52:29.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.873526 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 01:52:30.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.873561 systemd[1]: Stopped ignition-files.service. Jul 2 01:52:30.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.881315 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 01:52:30.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.881354 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 01:52:30.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.890358 systemd[1]: Stopping ignition-mount.service... Jul 2 01:52:29.899963 systemd[1]: Stopping iscsid.service... Jul 2 01:52:29.903191 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 01:52:29.903257 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 01:52:29.914313 systemd[1]: Stopping sysroot-boot.service... Jul 2 01:52:29.917975 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 01:52:29.918043 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 01:52:30.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.934577 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 01:52:29.934633 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 01:52:30.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.943737 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 01:52:29.943834 systemd[1]: Stopped iscsid.service. Jul 2 01:52:29.954456 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 01:52:29.954546 systemd[1]: Finished initrd-cleanup.service. Jul 2 01:52:30.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:29.966367 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 01:52:29.966776 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 01:52:29.966859 systemd[1]: Stopped ignition-mount.service. Jul 2 01:52:29.988208 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 01:52:29.988256 systemd[1]: Stopped ignition-disks.service. Jul 2 01:52:30.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.000755 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 01:52:30.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.000797 systemd[1]: Stopped ignition-kargs.service. Jul 2 01:52:30.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.010042 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 01:52:30.010080 systemd[1]: Stopped ignition-fetch.service. Jul 2 01:52:30.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.017706 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 01:52:30.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.224000 audit: BPF prog-id=6 op=UNLOAD Jul 2 01:52:30.017742 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 01:52:30.027449 systemd[1]: Stopped target paths.target. Jul 2 01:52:30.035328 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 01:52:30.042413 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 01:52:30.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.047226 systemd[1]: Stopped target slices.target. Jul 2 01:52:30.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.056762 systemd[1]: Stopped target sockets.target. Jul 2 01:52:30.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.064576 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 01:52:30.286598 kernel: hv_netvsc 000d3a07-155d-000d-3a07-155d000d3a07 eth0: Data path switched from VF: enP64960s1 Jul 2 01:52:30.064627 systemd[1]: Closed iscsid.socket. Jul 2 01:52:30.072822 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 01:52:30.072862 systemd[1]: Stopped ignition-setup.service. Jul 2 01:52:30.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.082343 systemd[1]: Stopping iscsiuio.service... Jul 2 01:52:30.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.090265 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 01:52:30.090354 systemd[1]: Stopped iscsiuio.service. Jul 2 01:52:30.098559 systemd[1]: Stopped target network.target. Jul 2 01:52:30.106196 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 01:52:30.106225 systemd[1]: Closed iscsiuio.socket. Jul 2 01:52:30.109825 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:52:30.117751 systemd[1]: Stopping systemd-resolved.service... Jul 2 01:52:30.124577 systemd-networkd[866]: eth0: DHCPv6 lease lost Jul 2 01:52:30.342000 audit: BPF prog-id=9 op=UNLOAD Jul 2 01:52:30.130110 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:52:30.130194 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:52:30.135044 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 01:52:30.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.135079 systemd[1]: Closed systemd-networkd.socket. Jul 2 01:52:30.152834 systemd[1]: Stopping network-cleanup.service... Jul 2 01:52:30.160954 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 01:52:30.161033 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 01:52:30.172233 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 01:52:30.172280 systemd[1]: Stopped systemd-sysctl.service. Jul 2 01:52:30.186933 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 01:52:30.186979 systemd[1]: Stopped systemd-modules-load.service. Jul 2 01:52:30.192719 systemd[1]: Stopping systemd-udevd.service... Jul 2 01:52:30.201368 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 01:52:30.201843 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 01:52:30.201942 systemd[1]: Stopped systemd-resolved.service. Jul 2 01:52:30.211500 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 01:52:30.211623 systemd[1]: Stopped systemd-udevd.service. Jul 2 01:52:30.225127 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 01:52:30.225972 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 01:52:30.235040 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 01:52:30.235079 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 01:52:30.242687 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 01:52:30.242727 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 01:52:30.253035 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 01:52:30.253076 systemd[1]: Stopped dracut-cmdline.service. Jul 2 01:52:30.261390 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 01:52:30.261427 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 01:52:30.281697 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 01:52:30.294374 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 01:52:30.294445 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 01:52:30.304168 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 01:52:30.304261 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 01:52:30.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.355622 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 01:52:30.355741 systemd[1]: Stopped network-cleanup.service. Jul 2 01:52:30.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:30.489851 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 01:52:30.489952 systemd[1]: Stopped sysroot-boot.service. Jul 2 01:52:30.496246 systemd[1]: Reached target initrd-switch-root.target. Jul 2 01:52:30.505941 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 01:52:30.505992 systemd[1]: Stopped initrd-setup-root.service. Jul 2 01:52:30.516071 systemd[1]: Starting initrd-switch-root.service... Jul 2 01:52:30.559016 systemd-journald[275]: Received SIGTERM from PID 1 (n/a). Jul 2 01:52:30.532459 systemd[1]: Switching root. Jul 2 01:52:30.559087 systemd-journald[275]: Journal stopped Jul 2 01:52:41.559666 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 01:52:41.559688 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 01:52:41.559698 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 01:52:41.559708 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 01:52:41.559716 kernel: SELinux: policy capability open_perms=1 Jul 2 01:52:41.559724 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 01:52:41.559733 kernel: SELinux: policy capability always_check_network=0 Jul 2 01:52:41.559741 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 01:52:41.559749 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 01:52:41.559757 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 01:52:41.559766 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 01:52:41.559774 kernel: kauditd_printk_skb: 42 callbacks suppressed Jul 2 01:52:41.559783 kernel: audit: type=1403 audit(1719885152.734:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:52:41.559792 systemd[1]: Successfully loaded SELinux policy in 263.738ms. Jul 2 01:52:41.559803 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 27.834ms. Jul 2 01:52:41.559815 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:52:41.559824 systemd[1]: Detected virtualization microsoft. Jul 2 01:52:41.559833 systemd[1]: Detected architecture arm64. Jul 2 01:52:41.559842 systemd[1]: Detected first boot. Jul 2 01:52:41.559851 systemd[1]: Hostname set to . Jul 2 01:52:41.559860 systemd[1]: Initializing machine ID from random generator. Jul 2 01:52:41.559870 kernel: audit: type=1400 audit(1719885153.496:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:41.559880 kernel: audit: type=1400 audit(1719885153.496:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:41.559889 kernel: audit: type=1334 audit(1719885153.512:84): prog-id=10 op=LOAD Jul 2 01:52:41.559897 kernel: audit: type=1334 audit(1719885153.512:85): prog-id=10 op=UNLOAD Jul 2 01:52:41.559905 kernel: audit: type=1334 audit(1719885153.528:86): prog-id=11 op=LOAD Jul 2 01:52:41.559914 kernel: audit: type=1334 audit(1719885153.528:87): prog-id=11 op=UNLOAD Jul 2 01:52:41.559922 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 01:52:41.559932 kernel: audit: type=1400 audit(1719885154.817:88): avc: denied { associate } for pid=1098 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:52:41.559944 kernel: audit: type=1300 audit(1719885154.817:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=40000222b4 a1=40000283a8 a2=4000026800 a3=32 items=0 ppid=1081 pid=1098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:41.559954 kernel: audit: type=1327 audit(1719885154.817:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:52:41.559962 systemd[1]: Populated /etc with preset unit settings. Jul 2 01:52:41.559971 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:52:41.559981 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:52:41.559991 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:52:41.560001 kernel: kauditd_printk_skb: 6 callbacks suppressed Jul 2 01:52:41.560009 kernel: audit: type=1334 audit(1719885160.868:90): prog-id=12 op=LOAD Jul 2 01:52:41.560017 kernel: audit: type=1334 audit(1719885160.868:91): prog-id=3 op=UNLOAD Jul 2 01:52:41.560026 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 01:52:41.560034 kernel: audit: type=1334 audit(1719885160.873:92): prog-id=13 op=LOAD Jul 2 01:52:41.560045 systemd[1]: Stopped initrd-switch-root.service. Jul 2 01:52:41.560055 kernel: audit: type=1334 audit(1719885160.878:93): prog-id=14 op=LOAD Jul 2 01:52:41.560065 kernel: audit: type=1334 audit(1719885160.878:94): prog-id=4 op=UNLOAD Jul 2 01:52:41.560073 kernel: audit: type=1334 audit(1719885160.878:95): prog-id=5 op=UNLOAD Jul 2 01:52:41.560082 kernel: audit: type=1131 audit(1719885160.879:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.560092 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 01:52:41.560101 kernel: audit: type=1334 audit(1719885160.900:97): prog-id=12 op=UNLOAD Jul 2 01:52:41.560110 kernel: audit: type=1130 audit(1719885160.935:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.560119 kernel: audit: type=1131 audit(1719885160.935:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.560128 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 01:52:41.560139 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 01:52:41.560149 systemd[1]: Created slice system-getty.slice. Jul 2 01:52:41.560158 systemd[1]: Created slice system-modprobe.slice. Jul 2 01:52:41.560167 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 01:52:41.560176 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 01:52:41.560186 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 01:52:41.560195 systemd[1]: Created slice user.slice. Jul 2 01:52:41.560204 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:52:41.560213 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 01:52:41.560223 systemd[1]: Set up automount boot.automount. Jul 2 01:52:41.560233 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 01:52:41.560242 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 01:52:41.560251 systemd[1]: Stopped target initrd-fs.target. Jul 2 01:52:41.560260 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 01:52:41.560269 systemd[1]: Reached target integritysetup.target. Jul 2 01:52:41.560279 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:52:41.560289 systemd[1]: Reached target remote-fs.target. Jul 2 01:52:41.560298 systemd[1]: Reached target slices.target. Jul 2 01:52:41.560307 systemd[1]: Reached target swap.target. Jul 2 01:52:41.560316 systemd[1]: Reached target torcx.target. Jul 2 01:52:41.560325 systemd[1]: Reached target veritysetup.target. Jul 2 01:52:41.560335 systemd[1]: Listening on systemd-coredump.socket. Jul 2 01:52:41.560344 systemd[1]: Listening on systemd-initctl.socket. Jul 2 01:52:41.560353 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:52:41.560364 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:52:41.560373 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:52:41.560382 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 01:52:41.560392 systemd[1]: Mounting dev-hugepages.mount... Jul 2 01:52:41.560401 systemd[1]: Mounting dev-mqueue.mount... Jul 2 01:52:41.560410 systemd[1]: Mounting media.mount... Jul 2 01:52:41.560421 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 01:52:41.560430 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 01:52:41.560439 systemd[1]: Mounting tmp.mount... Jul 2 01:52:41.560449 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 01:52:41.560458 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:41.560475 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:52:41.560485 systemd[1]: Starting modprobe@configfs.service... Jul 2 01:52:41.560494 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:41.560504 systemd[1]: Starting modprobe@drm.service... Jul 2 01:52:41.560514 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:41.560523 systemd[1]: Starting modprobe@fuse.service... Jul 2 01:52:41.560533 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:41.560544 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 01:52:41.560553 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 01:52:41.560562 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 01:52:41.560572 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 01:52:41.560581 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 01:52:41.560590 kernel: loop: module loaded Jul 2 01:52:41.560600 systemd[1]: Stopped systemd-journald.service. Jul 2 01:52:41.560609 systemd[1]: systemd-journald.service: Consumed 2.648s CPU time. Jul 2 01:52:41.560618 systemd[1]: Starting systemd-journald.service... Jul 2 01:52:41.560627 kernel: fuse: init (API version 7.34) Jul 2 01:52:41.560636 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:52:41.560646 systemd[1]: Starting systemd-network-generator.service... Jul 2 01:52:41.560655 systemd[1]: Starting systemd-remount-fs.service... Jul 2 01:52:41.560664 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:52:41.560674 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 01:52:41.560684 systemd[1]: Stopped verity-setup.service. Jul 2 01:52:41.560693 systemd[1]: Mounted dev-hugepages.mount. Jul 2 01:52:41.560705 systemd-journald[1204]: Journal started Jul 2 01:52:41.560742 systemd-journald[1204]: Runtime Journal (/run/log/journal/0f5a0ddb2b414ea38165418d19f8d2d8) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:52:32.734000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:52:33.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:33.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:52:33.512000 audit: BPF prog-id=10 op=LOAD Jul 2 01:52:33.512000 audit: BPF prog-id=10 op=UNLOAD Jul 2 01:52:33.528000 audit: BPF prog-id=11 op=LOAD Jul 2 01:52:33.528000 audit: BPF prog-id=11 op=UNLOAD Jul 2 01:52:34.817000 audit[1098]: AVC avc: denied { associate } for pid=1098 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:52:34.817000 audit[1098]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40000222b4 a1=40000283a8 a2=4000026800 a3=32 items=0 ppid=1081 pid=1098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:34.817000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:52:34.830000 audit[1098]: AVC avc: denied { associate } for pid=1098 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 01:52:34.830000 audit[1098]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022399 a2=1ed a3=0 items=2 ppid=1081 pid=1098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:34.830000 audit: CWD cwd="/" Jul 2 01:52:34.830000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:34.830000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:34.830000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:52:40.868000 audit: BPF prog-id=12 op=LOAD Jul 2 01:52:40.868000 audit: BPF prog-id=3 op=UNLOAD Jul 2 01:52:40.873000 audit: BPF prog-id=13 op=LOAD Jul 2 01:52:40.878000 audit: BPF prog-id=14 op=LOAD Jul 2 01:52:40.878000 audit: BPF prog-id=4 op=UNLOAD Jul 2 01:52:40.878000 audit: BPF prog-id=5 op=UNLOAD Jul 2 01:52:40.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:40.900000 audit: BPF prog-id=12 op=UNLOAD Jul 2 01:52:40.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:40.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.457000 audit: BPF prog-id=15 op=LOAD Jul 2 01:52:41.457000 audit: BPF prog-id=16 op=LOAD Jul 2 01:52:41.457000 audit: BPF prog-id=17 op=LOAD Jul 2 01:52:41.457000 audit: BPF prog-id=13 op=UNLOAD Jul 2 01:52:41.457000 audit: BPF prog-id=14 op=UNLOAD Jul 2 01:52:41.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.557000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 01:52:41.557000 audit[1204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffdbae2370 a2=4000 a3=1 items=0 ppid=1 pid=1204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:41.557000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 01:52:40.866854 systemd[1]: Queued start job for default target multi-user.target. Jul 2 01:52:34.754506 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:52:40.879882 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 01:52:34.773852 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:52:40.880209 systemd[1]: systemd-journald.service: Consumed 2.648s CPU time. Jul 2 01:52:34.773872 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:52:34.773908 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 01:52:34.773918 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 01:52:34.773947 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 01:52:34.773959 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 01:52:34.774157 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 01:52:34.774189 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:52:34.774200 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:52:34.803077 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 01:52:34.803139 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 01:52:34.803181 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 01:52:34.803197 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 01:52:34.803217 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 01:52:34.803229 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 01:52:39.819442 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:39Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:39.819713 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:39Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:39.819813 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:39Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:39.819974 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:39Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:52:39.820024 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:39Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 01:52:39.820077 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-07-02T01:52:39Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 01:52:41.577098 systemd[1]: Started systemd-journald.service. Jul 2 01:52:41.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.574890 systemd[1]: Mounted dev-mqueue.mount. Jul 2 01:52:41.578994 systemd[1]: Mounted media.mount. Jul 2 01:52:41.582414 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 01:52:41.586447 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 01:52:41.590656 systemd[1]: Mounted tmp.mount. Jul 2 01:52:41.594977 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 01:52:41.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.599507 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:52:41.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.603913 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 01:52:41.604038 systemd[1]: Finished modprobe@configfs.service. Jul 2 01:52:41.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.608996 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:41.609289 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:41.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.613743 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:52:41.614016 systemd[1]: Finished modprobe@drm.service. Jul 2 01:52:41.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.618242 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:41.618396 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:41.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.622953 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 01:52:41.623092 systemd[1]: Finished modprobe@fuse.service. Jul 2 01:52:41.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.627682 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:41.627787 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:41.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.632209 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:52:41.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.637020 systemd[1]: Finished systemd-network-generator.service. Jul 2 01:52:41.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.642250 systemd[1]: Finished systemd-remount-fs.service. Jul 2 01:52:41.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.646983 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:52:41.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.651918 systemd[1]: Reached target network-pre.target. Jul 2 01:52:41.657859 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 01:52:41.662986 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 01:52:41.666814 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 01:52:41.668431 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 01:52:41.673659 systemd[1]: Starting systemd-journal-flush.service... Jul 2 01:52:41.677910 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:41.678870 systemd[1]: Starting systemd-random-seed.service... Jul 2 01:52:41.682849 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:41.683812 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:52:41.688406 systemd[1]: Starting systemd-sysusers.service... Jul 2 01:52:41.693038 systemd[1]: Starting systemd-udev-settle.service... Jul 2 01:52:41.698722 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 01:52:41.703441 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 01:52:41.709232 udevadm[1218]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 01:52:41.729733 systemd-journald[1204]: Time spent on flushing to /var/log/journal/0f5a0ddb2b414ea38165418d19f8d2d8 is 13.341ms for 1069 entries. Jul 2 01:52:41.729733 systemd-journald[1204]: System Journal (/var/log/journal/0f5a0ddb2b414ea38165418d19f8d2d8) is 8.0M, max 2.6G, 2.6G free. Jul 2 01:52:41.834137 systemd-journald[1204]: Received client request to flush runtime journal. Jul 2 01:52:41.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:41.756895 systemd[1]: Finished systemd-random-seed.service. Jul 2 01:52:41.761551 systemd[1]: Reached target first-boot-complete.target. Jul 2 01:52:41.772499 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:52:41.835039 systemd[1]: Finished systemd-journal-flush.service. Jul 2 01:52:41.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:42.286570 systemd[1]: Finished systemd-sysusers.service. Jul 2 01:52:42.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:42.910219 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 01:52:42.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:42.915000 audit: BPF prog-id=18 op=LOAD Jul 2 01:52:42.915000 audit: BPF prog-id=19 op=LOAD Jul 2 01:52:42.915000 audit: BPF prog-id=7 op=UNLOAD Jul 2 01:52:42.915000 audit: BPF prog-id=8 op=UNLOAD Jul 2 01:52:42.916188 systemd[1]: Starting systemd-udevd.service... Jul 2 01:52:42.934307 systemd-udevd[1221]: Using default interface naming scheme 'v252'. Jul 2 01:52:43.270613 systemd[1]: Started systemd-udevd.service. Jul 2 01:52:43.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:43.282000 audit: BPF prog-id=20 op=LOAD Jul 2 01:52:43.283290 systemd[1]: Starting systemd-networkd.service... Jul 2 01:52:43.308625 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 01:52:43.335680 systemd[1]: Starting systemd-userdbd.service... Jul 2 01:52:43.334000 audit: BPF prog-id=21 op=LOAD Jul 2 01:52:43.334000 audit: BPF prog-id=22 op=LOAD Jul 2 01:52:43.334000 audit: BPF prog-id=23 op=LOAD Jul 2 01:52:43.367000 audit[1240]: AVC avc: denied { confidentiality } for pid=1240 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 01:52:43.374485 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 01:52:43.374570 kernel: hv_vmbus: registering driver hv_balloon Jul 2 01:52:43.374593 kernel: hv_vmbus: registering driver hyperv_fb Jul 2 01:52:43.391444 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Jul 2 01:52:43.391543 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Jul 2 01:52:43.403265 kernel: Console: switching to colour dummy device 80x25 Jul 2 01:52:43.395315 systemd[1]: Started systemd-userdbd.service. Jul 2 01:52:43.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:43.406524 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Jul 2 01:52:43.421136 kernel: hv_balloon: Memory hot add disabled on ARM64 Jul 2 01:52:43.421222 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:52:43.367000 audit[1240]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab14288bf0 a1=aa2c a2=ffff911f24b0 a3=aaab141e0010 items=12 ppid=1221 pid=1240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:43.367000 audit: CWD cwd="/" Jul 2 01:52:43.367000 audit: PATH item=0 name=(null) inode=6771 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=1 name=(null) inode=11417 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=2 name=(null) inode=11417 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=3 name=(null) inode=11418 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=4 name=(null) inode=11417 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=5 name=(null) inode=11419 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=6 name=(null) inode=11417 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=7 name=(null) inode=11420 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=8 name=(null) inode=11417 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=9 name=(null) inode=11421 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=10 name=(null) inode=11417 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PATH item=11 name=(null) inode=11422 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:43.367000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 01:52:43.458199 kernel: hv_utils: Registering HyperV Utility Driver Jul 2 01:52:43.458279 kernel: hv_vmbus: registering driver hv_utils Jul 2 01:52:43.465407 kernel: hv_utils: Shutdown IC version 3.2 Jul 2 01:52:43.465838 kernel: hv_utils: Heartbeat IC version 3.0 Jul 2 01:52:43.465880 kernel: hv_utils: TimeSync IC version 4.0 Jul 2 01:52:43.542345 systemd-networkd[1242]: lo: Link UP Jul 2 01:52:43.542641 systemd-networkd[1242]: lo: Gained carrier Jul 2 01:52:43.543121 systemd-networkd[1242]: Enumeration completed Jul 2 01:52:43.543321 systemd[1]: Started systemd-networkd.service. Jul 2 01:52:43.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:43.548935 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:52:43.571284 systemd-networkd[1242]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:52:43.621389 kernel: mlx5_core fdc0:00:02.0 enP64960s1: Link up Jul 2 01:52:43.646702 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1225) Jul 2 01:52:43.646819 kernel: hv_netvsc 000d3a07-155d-000d-3a07-155d000d3a07 eth0: Data path switched to VF: enP64960s1 Jul 2 01:52:43.648924 systemd-networkd[1242]: enP64960s1: Link UP Jul 2 01:52:43.649017 systemd-networkd[1242]: eth0: Link UP Jul 2 01:52:43.649021 systemd-networkd[1242]: eth0: Gained carrier Jul 2 01:52:43.651834 systemd-networkd[1242]: enP64960s1: Gained carrier Jul 2 01:52:43.659278 systemd-networkd[1242]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:52:43.668577 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:52:43.673980 systemd[1]: Finished systemd-udev-settle.service. Jul 2 01:52:43.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:43.679732 systemd[1]: Starting lvm2-activation-early.service... Jul 2 01:52:43.977687 lvm[1298]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:52:44.017283 systemd[1]: Finished lvm2-activation-early.service. Jul 2 01:52:44.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.022020 systemd[1]: Reached target cryptsetup.target. Jul 2 01:52:44.027408 systemd[1]: Starting lvm2-activation.service... Jul 2 01:52:44.030988 lvm[1299]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:52:44.056124 systemd[1]: Finished lvm2-activation.service. Jul 2 01:52:44.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.060916 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:52:44.065640 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 01:52:44.065667 systemd[1]: Reached target local-fs.target. Jul 2 01:52:44.069696 systemd[1]: Reached target machines.target. Jul 2 01:52:44.075247 systemd[1]: Starting ldconfig.service... Jul 2 01:52:44.094286 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:44.094379 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:44.095417 systemd[1]: Starting systemd-boot-update.service... Jul 2 01:52:44.100169 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 01:52:44.106206 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 01:52:44.111595 systemd[1]: Starting systemd-sysext.service... Jul 2 01:52:44.136259 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1301 (bootctl) Jul 2 01:52:44.137498 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 01:52:44.503514 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 01:52:44.591619 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 01:52:44.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.606106 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 01:52:44.606278 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 01:52:44.757379 kernel: loop0: detected capacity change from 0 to 194096 Jul 2 01:52:44.797380 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 01:52:44.816387 kernel: loop1: detected capacity change from 0 to 194096 Jul 2 01:52:44.826642 (sd-sysext)[1313]: Using extensions 'kubernetes'. Jul 2 01:52:44.827736 (sd-sysext)[1313]: Merged extensions into '/usr'. Jul 2 01:52:44.843324 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 01:52:44.844044 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 01:52:44.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.850761 systemd[1]: Mounting usr-share-oem.mount... Jul 2 01:52:44.854306 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:44.855498 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:44.860082 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:44.865473 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:44.869098 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:44.869226 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:44.871503 systemd[1]: Mounted usr-share-oem.mount. Jul 2 01:52:44.875867 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:44.875987 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:44.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.880888 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:44.881000 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:44.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.885843 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:44.885954 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:44.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.890760 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:44.890857 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:44.891848 systemd[1]: Finished systemd-sysext.service. Jul 2 01:52:44.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.897036 systemd-fsck[1309]: fsck.fat 4.2 (2021-01-31) Jul 2 01:52:44.897036 systemd-fsck[1309]: /dev/sda1: 236 files, 117047/258078 clusters Jul 2 01:52:44.899182 systemd[1]: Starting ensure-sysext.service... Jul 2 01:52:44.902804 systemd-networkd[1242]: eth0: Gained IPv6LL Jul 2 01:52:44.905540 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 01:52:44.912422 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:52:44.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.917838 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 01:52:44.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:44.928137 systemd[1]: Mounting boot.mount... Jul 2 01:52:44.931774 systemd[1]: Reloading. Jul 2 01:52:44.963926 /usr/lib/systemd/system-generators/torcx-generator[1346]: time="2024-07-02T01:52:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:52:44.964264 /usr/lib/systemd/system-generators/torcx-generator[1346]: time="2024-07-02T01:52:44Z" level=info msg="torcx already run" Jul 2 01:52:45.056887 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:52:45.056910 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:52:45.072178 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:52:45.133000 audit: BPF prog-id=24 op=LOAD Jul 2 01:52:45.133000 audit: BPF prog-id=25 op=LOAD Jul 2 01:52:45.133000 audit: BPF prog-id=18 op=UNLOAD Jul 2 01:52:45.133000 audit: BPF prog-id=19 op=UNLOAD Jul 2 01:52:45.135000 audit: BPF prog-id=26 op=LOAD Jul 2 01:52:45.135000 audit: BPF prog-id=15 op=UNLOAD Jul 2 01:52:45.135000 audit: BPF prog-id=27 op=LOAD Jul 2 01:52:45.135000 audit: BPF prog-id=28 op=LOAD Jul 2 01:52:45.135000 audit: BPF prog-id=16 op=UNLOAD Jul 2 01:52:45.135000 audit: BPF prog-id=17 op=UNLOAD Jul 2 01:52:45.136000 audit: BPF prog-id=29 op=LOAD Jul 2 01:52:45.136000 audit: BPF prog-id=21 op=UNLOAD Jul 2 01:52:45.136000 audit: BPF prog-id=30 op=LOAD Jul 2 01:52:45.136000 audit: BPF prog-id=31 op=LOAD Jul 2 01:52:45.136000 audit: BPF prog-id=22 op=UNLOAD Jul 2 01:52:45.136000 audit: BPF prog-id=23 op=UNLOAD Jul 2 01:52:45.137000 audit: BPF prog-id=32 op=LOAD Jul 2 01:52:45.137000 audit: BPF prog-id=20 op=UNLOAD Jul 2 01:52:45.142288 systemd[1]: Mounted boot.mount. Jul 2 01:52:45.152400 systemd[1]: Finished systemd-boot-update.service. Jul 2 01:52:45.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.159924 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.161205 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:45.164822 systemd-tmpfiles[1320]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 01:52:45.166115 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:45.171638 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:45.175332 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.175474 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:45.176245 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:45.176421 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:45.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.181307 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:45.181509 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:45.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.186466 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:45.186585 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:45.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.192259 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.193585 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:45.198300 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:45.203471 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:45.207093 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.207211 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:45.208006 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:45.208136 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:45.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.213009 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:45.213125 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:45.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.217921 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:45.218035 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:45.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.222704 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:45.222797 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.225126 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.226440 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:52:45.231281 systemd[1]: Starting modprobe@drm.service... Jul 2 01:52:45.235992 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:52:45.241162 systemd[1]: Starting modprobe@loop.service... Jul 2 01:52:45.244874 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.245000 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:45.245912 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:52:45.246058 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:52:45.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.250679 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:52:45.250803 systemd[1]: Finished modprobe@drm.service. Jul 2 01:52:45.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.255331 systemd-tmpfiles[1320]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 01:52:45.255365 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:52:45.255506 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:52:45.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.261028 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:52:45.261143 systemd[1]: Finished modprobe@loop.service. Jul 2 01:52:45.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.266058 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:52:45.266126 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:52:45.267126 systemd[1]: Finished ensure-sysext.service. Jul 2 01:52:45.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.320980 systemd-tmpfiles[1320]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 01:52:45.824237 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 01:52:45.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.830547 systemd[1]: Starting audit-rules.service... Jul 2 01:52:45.832876 kernel: kauditd_printk_skb: 118 callbacks suppressed Jul 2 01:52:45.832924 kernel: audit: type=1130 audit(1719885165.827:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.853112 systemd[1]: Starting clean-ca-certificates.service... Jul 2 01:52:45.858321 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 01:52:45.862000 audit: BPF prog-id=33 op=LOAD Jul 2 01:52:45.864765 systemd[1]: Starting systemd-resolved.service... Jul 2 01:52:45.872401 kernel: audit: type=1334 audit(1719885165.862:202): prog-id=33 op=LOAD Jul 2 01:52:45.872000 audit: BPF prog-id=34 op=LOAD Jul 2 01:52:45.878463 systemd[1]: Starting systemd-timesyncd.service... Jul 2 01:52:45.882179 kernel: audit: type=1334 audit(1719885165.872:203): prog-id=34 op=LOAD Jul 2 01:52:45.883477 systemd[1]: Starting systemd-update-utmp.service... Jul 2 01:52:45.923000 audit[1420]: SYSTEM_BOOT pid=1420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.944383 kernel: audit: type=1127 audit(1719885165.923:204): pid=1420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.944835 systemd[1]: Finished clean-ca-certificates.service. Jul 2 01:52:45.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.949934 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 01:52:45.955435 systemd[1]: Finished systemd-update-utmp.service. Jul 2 01:52:45.966388 kernel: audit: type=1130 audit(1719885165.948:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.981546 systemd[1]: Started systemd-timesyncd.service. Jul 2 01:52:46.020048 kernel: audit: type=1130 audit(1719885165.978:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.020185 kernel: audit: type=1130 audit(1719885165.999:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:45.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.000681 systemd[1]: Reached target time-set.target. Jul 2 01:52:46.059459 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 01:52:46.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.083651 kernel: audit: type=1130 audit(1719885166.063:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.083431 systemd-resolved[1418]: Positive Trust Anchors: Jul 2 01:52:46.083438 systemd-resolved[1418]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:52:46.083465 systemd-resolved[1418]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:52:46.087010 systemd-resolved[1418]: Using system hostname 'ci-3510.3.5-a-62a89fec45'. Jul 2 01:52:46.088554 systemd[1]: Started systemd-resolved.service. Jul 2 01:52:46.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.093568 systemd[1]: Reached target network.target. Jul 2 01:52:46.112699 systemd[1]: Reached target network-online.target. Jul 2 01:52:46.115383 kernel: audit: type=1130 audit(1719885166.092:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:52:46.118198 systemd[1]: Reached target nss-lookup.target. Jul 2 01:52:46.242000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:52:46.242000 audit[1435]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffefc0e870 a2=420 a3=0 items=0 ppid=1414 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:46.242000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 01:52:46.256371 kernel: audit: type=1305 audit(1719885166.242:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:52:46.258478 augenrules[1435]: No rules Jul 2 01:52:46.259400 systemd[1]: Finished audit-rules.service. Jul 2 01:52:46.426504 systemd-timesyncd[1419]: Contacted time server 208.67.75.242:123 (0.flatcar.pool.ntp.org). Jul 2 01:52:46.426576 systemd-timesyncd[1419]: Initial clock synchronization to Tue 2024-07-02 01:52:46.408934 UTC. Jul 2 01:52:52.213469 ldconfig[1300]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 01:52:52.222902 systemd[1]: Finished ldconfig.service. Jul 2 01:52:52.228671 systemd[1]: Starting systemd-update-done.service... Jul 2 01:52:52.253535 systemd[1]: Finished systemd-update-done.service. Jul 2 01:52:52.258426 systemd[1]: Reached target sysinit.target. Jul 2 01:52:52.262430 systemd[1]: Started motdgen.path. Jul 2 01:52:52.266210 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 01:52:52.272186 systemd[1]: Started logrotate.timer. Jul 2 01:52:52.275940 systemd[1]: Started mdadm.timer. Jul 2 01:52:52.279259 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 01:52:52.283931 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 01:52:52.283962 systemd[1]: Reached target paths.target. Jul 2 01:52:52.288057 systemd[1]: Reached target timers.target. Jul 2 01:52:52.292614 systemd[1]: Listening on dbus.socket. Jul 2 01:52:52.297580 systemd[1]: Starting docker.socket... Jul 2 01:52:52.303186 systemd[1]: Listening on sshd.socket. Jul 2 01:52:52.307753 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:52.308192 systemd[1]: Listening on docker.socket. Jul 2 01:52:52.312449 systemd[1]: Reached target sockets.target. Jul 2 01:52:52.316599 systemd[1]: Reached target basic.target. Jul 2 01:52:52.320461 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:52:52.320487 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:52:52.321416 systemd[1]: Starting containerd.service... Jul 2 01:52:52.326102 systemd[1]: Starting dbus.service... Jul 2 01:52:52.330349 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 01:52:52.335286 systemd[1]: Starting extend-filesystems.service... Jul 2 01:52:52.341861 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 01:52:52.356268 systemd[1]: Starting kubelet.service... Jul 2 01:52:52.360618 systemd[1]: Starting motdgen.service... Jul 2 01:52:52.364822 systemd[1]: Started nvidia.service. Jul 2 01:52:52.369716 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 01:52:52.374602 systemd[1]: Starting sshd-keygen.service... Jul 2 01:52:52.380253 systemd[1]: Starting systemd-logind.service... Jul 2 01:52:52.385712 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:52:52.385772 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 01:52:52.386133 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 01:52:52.386792 systemd[1]: Starting update-engine.service... Jul 2 01:52:52.391385 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 01:52:52.402530 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 01:52:52.402698 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 01:52:52.415774 jq[1445]: false Jul 2 01:52:52.416000 jq[1462]: true Jul 2 01:52:52.433829 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 01:52:52.433990 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 01:52:52.443083 extend-filesystems[1446]: Found loop1 Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda1 Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda2 Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda3 Jul 2 01:52:52.443083 extend-filesystems[1446]: Found usr Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda4 Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda6 Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda7 Jul 2 01:52:52.443083 extend-filesystems[1446]: Found sda9 Jul 2 01:52:52.443083 extend-filesystems[1446]: Checking size of /dev/sda9 Jul 2 01:52:52.452425 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 01:52:52.495216 jq[1466]: true Jul 2 01:52:52.452598 systemd[1]: Finished motdgen.service. Jul 2 01:52:52.539675 systemd-logind[1457]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 01:52:52.540488 systemd-logind[1457]: New seat seat0. Jul 2 01:52:52.573188 env[1467]: time="2024-07-02T01:52:52.570560374Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 01:52:52.577964 extend-filesystems[1446]: Old size kept for /dev/sda9 Jul 2 01:52:52.587561 extend-filesystems[1446]: Found sr0 Jul 2 01:52:52.582429 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 01:52:52.582590 systemd[1]: Finished extend-filesystems.service. Jul 2 01:52:52.633069 env[1467]: time="2024-07-02T01:52:52.633015106Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 01:52:52.633910 env[1467]: time="2024-07-02T01:52:52.633881143Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:52.636997 env[1467]: time="2024-07-02T01:52:52.636954718Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:52:52.636997 env[1467]: time="2024-07-02T01:52:52.636988612Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:52.637845 env[1467]: time="2024-07-02T01:52:52.637804568Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:52:52.637845 env[1467]: time="2024-07-02T01:52:52.637833066Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:52.637845 env[1467]: time="2024-07-02T01:52:52.637846975Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 01:52:52.637958 env[1467]: time="2024-07-02T01:52:52.637856767Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:52.640307 env[1467]: time="2024-07-02T01:52:52.640264827Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:52.643773 env[1467]: time="2024-07-02T01:52:52.642805343Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:52:52.643947 env[1467]: time="2024-07-02T01:52:52.643914068Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:52:52.643947 env[1467]: time="2024-07-02T01:52:52.643938329Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 01:52:52.645475 env[1467]: time="2024-07-02T01:52:52.645429833Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 01:52:52.645475 env[1467]: time="2024-07-02T01:52:52.645472239Z" level=info msg="metadata content store policy set" policy=shared Jul 2 01:52:52.646278 bash[1491]: Updated "/home/core/.ssh/authorized_keys" Jul 2 01:52:52.647110 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 01:52:52.657674 env[1467]: time="2024-07-02T01:52:52.657622774Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 01:52:52.657760 env[1467]: time="2024-07-02T01:52:52.657685125Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 01:52:52.657760 env[1467]: time="2024-07-02T01:52:52.657700753Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 01:52:52.657760 env[1467]: time="2024-07-02T01:52:52.657736165Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.657760 env[1467]: time="2024-07-02T01:52:52.657752192Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.657837 env[1467]: time="2024-07-02T01:52:52.657766901Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.657837 env[1467]: time="2024-07-02T01:52:52.657779810Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.658133 env[1467]: time="2024-07-02T01:52:52.658111868Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.658173 env[1467]: time="2024-07-02T01:52:52.658135330Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.658173 env[1467]: time="2024-07-02T01:52:52.658149759Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.658173 env[1467]: time="2024-07-02T01:52:52.658162628Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.658233 env[1467]: time="2024-07-02T01:52:52.658175898Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 01:52:52.658310 env[1467]: time="2024-07-02T01:52:52.658289448Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 01:52:52.658434 env[1467]: time="2024-07-02T01:52:52.658397803Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 01:52:52.658657 env[1467]: time="2024-07-02T01:52:52.658635016Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 01:52:52.658685 env[1467]: time="2024-07-02T01:52:52.658666031Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658685 env[1467]: time="2024-07-02T01:52:52.658679221Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 01:52:52.658735 env[1467]: time="2024-07-02T01:52:52.658719589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658765 env[1467]: time="2024-07-02T01:52:52.658736815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658765 env[1467]: time="2024-07-02T01:52:52.658749206Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658765 env[1467]: time="2024-07-02T01:52:52.658760397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658831 env[1467]: time="2024-07-02T01:52:52.658772907Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658831 env[1467]: time="2024-07-02T01:52:52.658784858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658831 env[1467]: time="2024-07-02T01:52:52.658799766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658831 env[1467]: time="2024-07-02T01:52:52.658811756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658831 env[1467]: time="2024-07-02T01:52:52.658827824Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 01:52:52.658956 env[1467]: time="2024-07-02T01:52:52.658936818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658983 env[1467]: time="2024-07-02T01:52:52.658957242Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.658983 env[1467]: time="2024-07-02T01:52:52.658978944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.659024 env[1467]: time="2024-07-02T01:52:52.658990375Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 01:52:52.659024 env[1467]: time="2024-07-02T01:52:52.659005603Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 01:52:52.659024 env[1467]: time="2024-07-02T01:52:52.659015835Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 01:52:52.659083 env[1467]: time="2024-07-02T01:52:52.659032622Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 01:52:52.659083 env[1467]: time="2024-07-02T01:52:52.659066236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 01:52:52.659303 env[1467]: time="2024-07-02T01:52:52.659251410Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.659310163Z" level=info msg="Connect containerd service" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.659342857Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.663153012Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.663401496Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.663438147Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.663482712Z" level=info msg="containerd successfully booted in 0.095094s" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.666765042Z" level=info msg="Start subscribing containerd event" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.666833748Z" level=info msg="Start recovering state" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.666901735Z" level=info msg="Start event monitor" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.666924037Z" level=info msg="Start snapshots syncer" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.666933709Z" level=info msg="Start cni network conf syncer for default" Jul 2 01:52:52.674868 env[1467]: time="2024-07-02T01:52:52.666945060Z" level=info msg="Start streaming server" Jul 2 01:52:52.663557 systemd[1]: Started containerd.service. Jul 2 01:52:52.759276 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 01:52:52.765899 dbus-daemon[1444]: [system] SELinux support is enabled Jul 2 01:52:52.766035 systemd[1]: Started dbus.service. Jul 2 01:52:52.771201 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 01:52:52.771231 systemd[1]: Reached target system-config.target. Jul 2 01:52:52.779748 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 01:52:52.779772 systemd[1]: Reached target user-config.target. Jul 2 01:52:52.784687 dbus-daemon[1444]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 01:52:52.785426 systemd[1]: Started systemd-logind.service. Jul 2 01:52:53.080681 systemd[1]: Started kubelet.service. Jul 2 01:52:53.100637 update_engine[1461]: I0702 01:52:53.086537 1461 main.cc:92] Flatcar Update Engine starting Jul 2 01:52:53.153633 systemd[1]: Started update-engine.service. Jul 2 01:52:53.153936 update_engine[1461]: I0702 01:52:53.153685 1461 update_check_scheduler.cc:74] Next update check in 5m36s Jul 2 01:52:53.159850 systemd[1]: Started locksmithd.service. Jul 2 01:52:53.551961 kubelet[1547]: E0702 01:52:53.551876 1547 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:52:53.554081 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:52:53.554197 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:52:54.330931 locksmithd[1548]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 01:52:56.365986 sshd_keygen[1460]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 01:52:56.382298 systemd[1]: Finished sshd-keygen.service. Jul 2 01:52:56.389308 systemd[1]: Starting issuegen.service... Jul 2 01:52:56.394077 systemd[1]: Started waagent.service. Jul 2 01:52:56.398927 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 01:52:56.399095 systemd[1]: Finished issuegen.service. Jul 2 01:52:56.404818 systemd[1]: Starting systemd-user-sessions.service... Jul 2 01:52:56.440861 systemd[1]: Finished systemd-user-sessions.service. Jul 2 01:52:56.447565 systemd[1]: Started getty@tty1.service. Jul 2 01:52:56.453200 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 01:52:56.458091 systemd[1]: Reached target getty.target. Jul 2 01:52:56.462130 systemd[1]: Reached target multi-user.target. Jul 2 01:52:56.467596 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 01:52:56.478824 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 01:52:56.478981 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 01:52:56.484323 systemd[1]: Startup finished in 707ms (kernel) + 12.664s (initrd) + 24.290s (userspace) = 37.661s. Jul 2 01:52:57.153099 login[1572]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:52:57.154619 login[1573]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:52:57.203953 systemd[1]: Created slice user-500.slice. Jul 2 01:52:57.205104 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 01:52:57.207410 systemd-logind[1457]: New session 1 of user core. Jul 2 01:52:57.209743 systemd-logind[1457]: New session 2 of user core. Jul 2 01:52:57.227964 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 01:52:57.229405 systemd[1]: Starting user@500.service... Jul 2 01:52:57.261461 (systemd)[1576]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:52:57.481136 systemd[1576]: Queued start job for default target default.target. Jul 2 01:52:57.481654 systemd[1576]: Reached target paths.target. Jul 2 01:52:57.481673 systemd[1576]: Reached target sockets.target. Jul 2 01:52:57.481683 systemd[1576]: Reached target timers.target. Jul 2 01:52:57.481693 systemd[1576]: Reached target basic.target. Jul 2 01:52:57.481792 systemd[1]: Started user@500.service. Jul 2 01:52:57.482662 systemd[1]: Started session-1.scope. Jul 2 01:52:57.483170 systemd[1576]: Reached target default.target. Jul 2 01:52:57.483220 systemd[1576]: Startup finished in 215ms. Jul 2 01:52:57.483229 systemd[1]: Started session-2.scope. Jul 2 01:53:02.917795 waagent[1570]: 2024-07-02T01:53:02.917690Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Jul 2 01:53:02.927151 waagent[1570]: 2024-07-02T01:53:02.927051Z INFO Daemon Daemon OS: flatcar 3510.3.5 Jul 2 01:53:02.931782 waagent[1570]: 2024-07-02T01:53:02.931690Z INFO Daemon Daemon Python: 3.9.16 Jul 2 01:53:02.936454 waagent[1570]: 2024-07-02T01:53:02.936352Z INFO Daemon Daemon Run daemon Jul 2 01:53:02.940996 waagent[1570]: 2024-07-02T01:53:02.940916Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.5' Jul 2 01:53:02.957921 waagent[1570]: 2024-07-02T01:53:02.957781Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:53:02.972445 waagent[1570]: 2024-07-02T01:53:02.972263Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:53:02.982531 waagent[1570]: 2024-07-02T01:53:02.982437Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:53:02.987881 waagent[1570]: 2024-07-02T01:53:02.987787Z INFO Daemon Daemon Using waagent for provisioning Jul 2 01:53:02.993923 waagent[1570]: 2024-07-02T01:53:02.993839Z INFO Daemon Daemon Activate resource disk Jul 2 01:53:02.999174 waagent[1570]: 2024-07-02T01:53:02.999090Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Jul 2 01:53:03.014130 waagent[1570]: 2024-07-02T01:53:03.014040Z INFO Daemon Daemon Found device: None Jul 2 01:53:03.018983 waagent[1570]: 2024-07-02T01:53:03.018893Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Jul 2 01:53:03.028177 waagent[1570]: 2024-07-02T01:53:03.028085Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Jul 2 01:53:03.040835 waagent[1570]: 2024-07-02T01:53:03.040761Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:53:03.046949 waagent[1570]: 2024-07-02T01:53:03.046867Z INFO Daemon Daemon Running default provisioning handler Jul 2 01:53:03.061060 waagent[1570]: 2024-07-02T01:53:03.060918Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:53:03.076735 waagent[1570]: 2024-07-02T01:53:03.076587Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:53:03.087091 waagent[1570]: 2024-07-02T01:53:03.086995Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:53:03.092579 waagent[1570]: 2024-07-02T01:53:03.092485Z INFO Daemon Daemon Copying ovf-env.xml Jul 2 01:53:03.166520 waagent[1570]: 2024-07-02T01:53:03.166388Z INFO Daemon Daemon Successfully mounted dvd Jul 2 01:53:03.253844 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Jul 2 01:53:03.289840 waagent[1570]: 2024-07-02T01:53:03.289698Z INFO Daemon Daemon Detect protocol endpoint Jul 2 01:53:03.294689 waagent[1570]: 2024-07-02T01:53:03.294615Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:53:03.300504 waagent[1570]: 2024-07-02T01:53:03.300438Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Jul 2 01:53:03.306822 waagent[1570]: 2024-07-02T01:53:03.306763Z INFO Daemon Daemon Test for route to 168.63.129.16 Jul 2 01:53:03.312236 waagent[1570]: 2024-07-02T01:53:03.312178Z INFO Daemon Daemon Route to 168.63.129.16 exists Jul 2 01:53:03.317177 waagent[1570]: 2024-07-02T01:53:03.317121Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Jul 2 01:53:03.476681 waagent[1570]: 2024-07-02T01:53:03.476610Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Jul 2 01:53:03.483656 waagent[1570]: 2024-07-02T01:53:03.483610Z INFO Daemon Daemon Wire protocol version:2012-11-30 Jul 2 01:53:03.488726 waagent[1570]: 2024-07-02T01:53:03.488672Z INFO Daemon Daemon Server preferred version:2015-04-05 Jul 2 01:53:03.804927 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 01:53:03.805087 systemd[1]: Stopped kubelet.service. Jul 2 01:53:03.806400 systemd[1]: Starting kubelet.service... Jul 2 01:53:03.923546 waagent[1570]: 2024-07-02T01:53:03.923392Z INFO Daemon Daemon Initializing goal state during protocol detection Jul 2 01:53:03.938786 waagent[1570]: 2024-07-02T01:53:03.938706Z INFO Daemon Daemon Forcing an update of the goal state.. Jul 2 01:53:03.944487 waagent[1570]: 2024-07-02T01:53:03.944424Z INFO Daemon Daemon Fetching goal state [incarnation 1] Jul 2 01:53:04.018574 waagent[1570]: 2024-07-02T01:53:04.018444Z INFO Daemon Daemon Found private key matching thumbprint 0B118F395ACDB06E04A51E4BE7E5D453C5CEF238 Jul 2 01:53:04.026935 waagent[1570]: 2024-07-02T01:53:04.026840Z INFO Daemon Daemon Certificate with thumbprint 5201E0CA161C24DF56E80650AE47602076A33D5B has no matching private key. Jul 2 01:53:04.036617 waagent[1570]: 2024-07-02T01:53:04.036526Z INFO Daemon Daemon Fetch goal state completed Jul 2 01:53:04.062175 waagent[1570]: 2024-07-02T01:53:04.062067Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 09a4a956-ce4d-4b39-be3f-8daf38825cc4 New eTag: 4448536747965513849] Jul 2 01:53:04.073390 waagent[1570]: 2024-07-02T01:53:04.073276Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:53:04.088946 waagent[1570]: 2024-07-02T01:53:04.088851Z INFO Daemon Daemon Starting provisioning Jul 2 01:53:04.094161 waagent[1570]: 2024-07-02T01:53:04.094089Z INFO Daemon Daemon Handle ovf-env.xml. Jul 2 01:53:04.099163 waagent[1570]: 2024-07-02T01:53:04.099102Z INFO Daemon Daemon Set hostname [ci-3510.3.5-a-62a89fec45] Jul 2 01:53:04.238336 systemd[1]: Started kubelet.service. Jul 2 01:53:04.445412 kubelet[1622]: E0702 01:53:04.445297 1622 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:04.448188 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:04.448307 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:04.735146 waagent[1570]: 2024-07-02T01:53:04.735006Z INFO Daemon Daemon Publish hostname [ci-3510.3.5-a-62a89fec45] Jul 2 01:53:04.741731 waagent[1570]: 2024-07-02T01:53:04.741642Z INFO Daemon Daemon Examine /proc/net/route for primary interface Jul 2 01:53:04.748338 waagent[1570]: 2024-07-02T01:53:04.748268Z INFO Daemon Daemon Primary interface is [eth0] Jul 2 01:53:04.764526 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Jul 2 01:53:04.764683 systemd[1]: Stopped systemd-networkd-wait-online.service. Jul 2 01:53:04.764739 systemd[1]: Stopping systemd-networkd-wait-online.service... Jul 2 01:53:04.765018 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:53:04.768424 systemd-networkd[1242]: eth0: DHCPv6 lease lost Jul 2 01:53:04.769760 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:53:04.769935 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:53:04.771927 systemd[1]: Starting systemd-networkd.service... Jul 2 01:53:04.800365 systemd-networkd[1631]: enP64960s1: Link UP Jul 2 01:53:04.800635 systemd-networkd[1631]: enP64960s1: Gained carrier Jul 2 01:53:04.801579 systemd-networkd[1631]: eth0: Link UP Jul 2 01:53:04.801656 systemd-networkd[1631]: eth0: Gained carrier Jul 2 01:53:04.802026 systemd-networkd[1631]: lo: Link UP Jul 2 01:53:04.802097 systemd-networkd[1631]: lo: Gained carrier Jul 2 01:53:04.802459 systemd-networkd[1631]: eth0: Gained IPv6LL Jul 2 01:53:04.802760 systemd-networkd[1631]: Enumeration completed Jul 2 01:53:04.802930 systemd[1]: Started systemd-networkd.service. Jul 2 01:53:04.804673 waagent[1570]: 2024-07-02T01:53:04.804029Z INFO Daemon Daemon Create user account if not exists Jul 2 01:53:04.805438 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:53:04.811095 waagent[1570]: 2024-07-02T01:53:04.811001Z INFO Daemon Daemon User core already exists, skip useradd Jul 2 01:53:04.817071 waagent[1570]: 2024-07-02T01:53:04.816982Z INFO Daemon Daemon Configure sudoer Jul 2 01:53:04.817243 systemd-networkd[1631]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:53:04.822597 waagent[1570]: 2024-07-02T01:53:04.822510Z INFO Daemon Daemon Configure sshd Jul 2 01:53:04.826838 waagent[1570]: 2024-07-02T01:53:04.826756Z INFO Daemon Daemon Deploy ssh public key. Jul 2 01:53:04.841460 systemd-networkd[1631]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:53:04.843518 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:53:06.130831 waagent[1570]: 2024-07-02T01:53:06.130767Z INFO Daemon Daemon Provisioning complete Jul 2 01:53:06.157260 waagent[1570]: 2024-07-02T01:53:06.157191Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Jul 2 01:53:06.164738 waagent[1570]: 2024-07-02T01:53:06.164647Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Jul 2 01:53:06.175968 waagent[1570]: 2024-07-02T01:53:06.175880Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Jul 2 01:53:06.481812 waagent[1640]: 2024-07-02T01:53:06.481660Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Jul 2 01:53:06.482545 waagent[1640]: 2024-07-02T01:53:06.482489Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:06.482683 waagent[1640]: 2024-07-02T01:53:06.482638Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:06.495127 waagent[1640]: 2024-07-02T01:53:06.495042Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Jul 2 01:53:06.495317 waagent[1640]: 2024-07-02T01:53:06.495270Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Jul 2 01:53:06.563404 waagent[1640]: 2024-07-02T01:53:06.563248Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0B118F395ACDB06E04A51E4BE7E5D453C5CEF238 Jul 2 01:53:06.563627 waagent[1640]: 2024-07-02T01:53:06.563573Z INFO ExtHandler ExtHandler Certificate with thumbprint 5201E0CA161C24DF56E80650AE47602076A33D5B has no matching private key. Jul 2 01:53:06.563849 waagent[1640]: 2024-07-02T01:53:06.563802Z INFO ExtHandler ExtHandler Fetch goal state completed Jul 2 01:53:06.581141 waagent[1640]: 2024-07-02T01:53:06.581086Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 5396f57b-dcb3-4b82-a5d9-6e75dd2321c8 New eTag: 4448536747965513849] Jul 2 01:53:06.581772 waagent[1640]: 2024-07-02T01:53:06.581712Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:53:06.653348 waagent[1640]: 2024-07-02T01:53:06.653192Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:53:06.678451 waagent[1640]: 2024-07-02T01:53:06.678339Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1640 Jul 2 01:53:06.682231 waagent[1640]: 2024-07-02T01:53:06.682160Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:53:06.683586 waagent[1640]: 2024-07-02T01:53:06.683527Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:53:06.784580 waagent[1640]: 2024-07-02T01:53:06.784463Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:53:06.784945 waagent[1640]: 2024-07-02T01:53:06.784884Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:53:06.792777 waagent[1640]: 2024-07-02T01:53:06.792720Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:53:06.793499 waagent[1640]: 2024-07-02T01:53:06.793441Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:53:06.794780 waagent[1640]: 2024-07-02T01:53:06.794720Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Jul 2 01:53:06.796326 waagent[1640]: 2024-07-02T01:53:06.796247Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:53:06.796785 waagent[1640]: 2024-07-02T01:53:06.796702Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:06.797311 waagent[1640]: 2024-07-02T01:53:06.797236Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:06.798033 waagent[1640]: 2024-07-02T01:53:06.797959Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:53:06.798439 waagent[1640]: 2024-07-02T01:53:06.798339Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:53:06.798439 waagent[1640]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:53:06.798439 waagent[1640]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:53:06.798439 waagent[1640]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:53:06.798439 waagent[1640]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:06.798439 waagent[1640]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:06.798439 waagent[1640]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:06.799438 waagent[1640]: 2024-07-02T01:53:06.799327Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:53:06.801650 waagent[1640]: 2024-07-02T01:53:06.800232Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:53:06.802686 waagent[1640]: 2024-07-02T01:53:06.802496Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:53:06.802951 waagent[1640]: 2024-07-02T01:53:06.802872Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:06.803988 waagent[1640]: 2024-07-02T01:53:06.803892Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:53:06.804506 waagent[1640]: 2024-07-02T01:53:06.804422Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:53:06.804761 waagent[1640]: 2024-07-02T01:53:06.804690Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:06.804917 waagent[1640]: 2024-07-02T01:53:06.804850Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:53:06.806596 waagent[1640]: 2024-07-02T01:53:06.806512Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:53:06.809664 waagent[1640]: 2024-07-02T01:53:06.809600Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:53:06.812522 waagent[1640]: 2024-07-02T01:53:06.812442Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:53:06.821776 waagent[1640]: 2024-07-02T01:53:06.821719Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Jul 2 01:53:06.822542 waagent[1640]: 2024-07-02T01:53:06.822494Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:53:06.823587 waagent[1640]: 2024-07-02T01:53:06.823533Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Jul 2 01:53:06.865252 waagent[1640]: 2024-07-02T01:53:06.865187Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Jul 2 01:53:06.869303 waagent[1640]: 2024-07-02T01:53:06.869232Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1631' Jul 2 01:53:06.958563 waagent[1640]: 2024-07-02T01:53:06.958427Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:53:06.958563 waagent[1640]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:53:06.958563 waagent[1640]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:53:06.958563 waagent[1640]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:07:15:5d brd ff:ff:ff:ff:ff:ff Jul 2 01:53:06.958563 waagent[1640]: 3: enP64960s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:07:15:5d brd ff:ff:ff:ff:ff:ff\ altname enP64960p0s2 Jul 2 01:53:06.958563 waagent[1640]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:53:06.958563 waagent[1640]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:53:06.958563 waagent[1640]: 2: eth0 inet 10.200.20.48/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:53:06.958563 waagent[1640]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:53:06.958563 waagent[1640]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:53:06.958563 waagent[1640]: 2: eth0 inet6 fe80::20d:3aff:fe07:155d/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:53:07.153868 waagent[1640]: 2024-07-02T01:53:07.153748Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.11.1.4 -- exiting Jul 2 01:53:08.180672 waagent[1570]: 2024-07-02T01:53:08.180512Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Jul 2 01:53:08.185464 waagent[1570]: 2024-07-02T01:53:08.185411Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.11.1.4 to be the latest agent Jul 2 01:53:09.375717 waagent[1679]: 2024-07-02T01:53:09.375615Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.11.1.4) Jul 2 01:53:09.376447 waagent[1679]: 2024-07-02T01:53:09.376384Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.5 Jul 2 01:53:09.376584 waagent[1679]: 2024-07-02T01:53:09.376540Z INFO ExtHandler ExtHandler Python: 3.9.16 Jul 2 01:53:09.376712 waagent[1679]: 2024-07-02T01:53:09.376668Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Jul 2 01:53:09.385188 waagent[1679]: 2024-07-02T01:53:09.385060Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:53:09.385610 waagent[1679]: 2024-07-02T01:53:09.385555Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:09.385761 waagent[1679]: 2024-07-02T01:53:09.385715Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:09.399192 waagent[1679]: 2024-07-02T01:53:09.399113Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Jul 2 01:53:09.411476 waagent[1679]: 2024-07-02T01:53:09.411408Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.151 Jul 2 01:53:09.412573 waagent[1679]: 2024-07-02T01:53:09.412513Z INFO ExtHandler Jul 2 01:53:09.412727 waagent[1679]: 2024-07-02T01:53:09.412679Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: bb5afa03-4cf6-4266-afa3-d52e08b42379 eTag: 4448536747965513849 source: Fabric] Jul 2 01:53:09.413501 waagent[1679]: 2024-07-02T01:53:09.413442Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Jul 2 01:53:09.414752 waagent[1679]: 2024-07-02T01:53:09.414691Z INFO ExtHandler Jul 2 01:53:09.414884 waagent[1679]: 2024-07-02T01:53:09.414839Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Jul 2 01:53:09.421969 waagent[1679]: 2024-07-02T01:53:09.421921Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Jul 2 01:53:09.422490 waagent[1679]: 2024-07-02T01:53:09.422441Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:53:09.442688 waagent[1679]: 2024-07-02T01:53:09.442627Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Jul 2 01:53:09.513813 waagent[1679]: 2024-07-02T01:53:09.513669Z INFO ExtHandler Downloaded certificate {'thumbprint': '5201E0CA161C24DF56E80650AE47602076A33D5B', 'hasPrivateKey': False} Jul 2 01:53:09.514960 waagent[1679]: 2024-07-02T01:53:09.514895Z INFO ExtHandler Downloaded certificate {'thumbprint': '0B118F395ACDB06E04A51E4BE7E5D453C5CEF238', 'hasPrivateKey': True} Jul 2 01:53:09.516030 waagent[1679]: 2024-07-02T01:53:09.515970Z INFO ExtHandler Fetch goal state completed Jul 2 01:53:09.539230 waagent[1679]: 2024-07-02T01:53:09.539105Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Jul 2 01:53:09.551870 waagent[1679]: 2024-07-02T01:53:09.551752Z INFO ExtHandler ExtHandler WALinuxAgent-2.11.1.4 running as process 1679 Jul 2 01:53:09.555580 waagent[1679]: 2024-07-02T01:53:09.555501Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:53:09.557116 waagent[1679]: 2024-07-02T01:53:09.557053Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:53:09.562341 waagent[1679]: 2024-07-02T01:53:09.562271Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:53:09.562774 waagent[1679]: 2024-07-02T01:53:09.562713Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:53:09.570647 waagent[1679]: 2024-07-02T01:53:09.570590Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:53:09.571314 waagent[1679]: 2024-07-02T01:53:09.571257Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:53:09.578029 waagent[1679]: 2024-07-02T01:53:09.577919Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Jul 2 01:53:09.579264 waagent[1679]: 2024-07-02T01:53:09.579200Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Jul 2 01:53:09.581033 waagent[1679]: 2024-07-02T01:53:09.580964Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:53:09.581326 waagent[1679]: 2024-07-02T01:53:09.581255Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:09.581921 waagent[1679]: 2024-07-02T01:53:09.581852Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:09.582597 waagent[1679]: 2024-07-02T01:53:09.582522Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:53:09.583053 waagent[1679]: 2024-07-02T01:53:09.582986Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:53:09.583923 waagent[1679]: 2024-07-02T01:53:09.583775Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:53:09.584135 waagent[1679]: 2024-07-02T01:53:09.584067Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:53:09.584263 waagent[1679]: 2024-07-02T01:53:09.584198Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:53:09.584263 waagent[1679]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:53:09.584263 waagent[1679]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:53:09.584263 waagent[1679]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:53:09.584263 waagent[1679]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:09.584263 waagent[1679]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:09.584263 waagent[1679]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:53:09.584901 waagent[1679]: 2024-07-02T01:53:09.584832Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:53:09.587644 waagent[1679]: 2024-07-02T01:53:09.587533Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:53:09.588172 waagent[1679]: 2024-07-02T01:53:09.588108Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:53:09.588350 waagent[1679]: 2024-07-02T01:53:09.588287Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:53:09.589280 waagent[1679]: 2024-07-02T01:53:09.589214Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:53:09.589568 waagent[1679]: 2024-07-02T01:53:09.589508Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:53:09.591555 waagent[1679]: 2024-07-02T01:53:09.591489Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:53:09.596238 waagent[1679]: 2024-07-02T01:53:09.596172Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:53:09.605582 waagent[1679]: 2024-07-02T01:53:09.605492Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:53:09.605582 waagent[1679]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:53:09.605582 waagent[1679]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:53:09.605582 waagent[1679]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:07:15:5d brd ff:ff:ff:ff:ff:ff Jul 2 01:53:09.605582 waagent[1679]: 3: enP64960s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:07:15:5d brd ff:ff:ff:ff:ff:ff\ altname enP64960p0s2 Jul 2 01:53:09.605582 waagent[1679]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:53:09.605582 waagent[1679]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:53:09.605582 waagent[1679]: 2: eth0 inet 10.200.20.48/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:53:09.605582 waagent[1679]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:53:09.605582 waagent[1679]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:53:09.605582 waagent[1679]: 2: eth0 inet6 fe80::20d:3aff:fe07:155d/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:53:09.608609 waagent[1679]: 2024-07-02T01:53:09.608538Z INFO ExtHandler ExtHandler Downloading agent manifest Jul 2 01:53:09.624046 waagent[1679]: 2024-07-02T01:53:09.623956Z INFO ExtHandler ExtHandler Jul 2 01:53:09.625629 waagent[1679]: 2024-07-02T01:53:09.625548Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 9f93e272-0a6e-4263-8f14-4e9f5cc905b9 correlation 65374b80-537f-4e6a-b8b4-7013c7e2730e created: 2024-07-02T01:51:34.349236Z] Jul 2 01:53:09.630029 waagent[1679]: 2024-07-02T01:53:09.629906Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Jul 2 01:53:09.636276 waagent[1679]: 2024-07-02T01:53:09.636210Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 12 ms] Jul 2 01:53:09.665630 waagent[1679]: 2024-07-02T01:53:09.665529Z INFO ExtHandler ExtHandler Looking for existing remote access users. Jul 2 01:53:09.682897 waagent[1679]: 2024-07-02T01:53:09.682804Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.11.1.4 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 144A6E5A-3A31-43BF-8184-C18FABB5F744;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Jul 2 01:53:09.746469 waagent[1679]: 2024-07-02T01:53:09.746314Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Jul 2 01:53:09.746469 waagent[1679]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:09.746469 waagent[1679]: pkts bytes target prot opt in out source destination Jul 2 01:53:09.746469 waagent[1679]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:09.746469 waagent[1679]: pkts bytes target prot opt in out source destination Jul 2 01:53:09.746469 waagent[1679]: Chain OUTPUT (policy ACCEPT 5 packets, 453 bytes) Jul 2 01:53:09.746469 waagent[1679]: pkts bytes target prot opt in out source destination Jul 2 01:53:09.746469 waagent[1679]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:53:09.746469 waagent[1679]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:53:09.746469 waagent[1679]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:53:09.754280 waagent[1679]: 2024-07-02T01:53:09.754159Z INFO EnvHandler ExtHandler Current Firewall rules: Jul 2 01:53:09.754280 waagent[1679]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:09.754280 waagent[1679]: pkts bytes target prot opt in out source destination Jul 2 01:53:09.754280 waagent[1679]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:53:09.754280 waagent[1679]: pkts bytes target prot opt in out source destination Jul 2 01:53:09.754280 waagent[1679]: Chain OUTPUT (policy ACCEPT 5 packets, 453 bytes) Jul 2 01:53:09.754280 waagent[1679]: pkts bytes target prot opt in out source destination Jul 2 01:53:09.754280 waagent[1679]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:53:09.754280 waagent[1679]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:53:09.754280 waagent[1679]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:53:09.755183 waagent[1679]: 2024-07-02T01:53:09.755135Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Jul 2 01:53:14.699119 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 01:53:14.699287 systemd[1]: Stopped kubelet.service. Jul 2 01:53:14.700668 systemd[1]: Starting kubelet.service... Jul 2 01:53:14.776878 systemd[1]: Started kubelet.service. Jul 2 01:53:14.816275 kubelet[1731]: E0702 01:53:14.816222 1731 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:14.818489 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:14.818610 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:25.021676 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 01:53:25.021848 systemd[1]: Stopped kubelet.service. Jul 2 01:53:25.023222 systemd[1]: Starting kubelet.service... Jul 2 01:53:25.102072 systemd[1]: Started kubelet.service. Jul 2 01:53:25.633973 kubelet[1741]: E0702 01:53:25.633884 1741 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:25.637073 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:25.637281 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:31.405686 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Jul 2 01:53:35.771670 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 01:53:35.771840 systemd[1]: Stopped kubelet.service. Jul 2 01:53:35.773232 systemd[1]: Starting kubelet.service... Jul 2 01:53:35.855178 systemd[1]: Started kubelet.service. Jul 2 01:53:36.619597 kubelet[1751]: E0702 01:53:36.375687 1751 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:36.377669 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:36.377790 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:38.853821 update_engine[1461]: I0702 01:53:38.853425 1461 update_attempter.cc:509] Updating boot flags... Jul 2 01:53:41.183503 systemd[1]: Created slice system-sshd.slice. Jul 2 01:53:41.185153 systemd[1]: Started sshd@0-10.200.20.48:22-10.200.16.10:54502.service. Jul 2 01:53:41.983287 sshd[1824]: Accepted publickey for core from 10.200.16.10 port 54502 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:42.000047 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:42.004023 systemd-logind[1457]: New session 3 of user core. Jul 2 01:53:42.004489 systemd[1]: Started session-3.scope. Jul 2 01:53:42.413723 systemd[1]: Started sshd@1-10.200.20.48:22-10.200.16.10:54518.service. Jul 2 01:53:42.898624 sshd[1829]: Accepted publickey for core from 10.200.16.10 port 54518 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:42.899966 sshd[1829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:42.903961 systemd-logind[1457]: New session 4 of user core. Jul 2 01:53:42.904421 systemd[1]: Started session-4.scope. Jul 2 01:53:43.257995 sshd[1829]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:43.261047 systemd[1]: sshd@1-10.200.20.48:22-10.200.16.10:54518.service: Deactivated successfully. Jul 2 01:53:43.261797 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 01:53:43.262447 systemd-logind[1457]: Session 4 logged out. Waiting for processes to exit. Jul 2 01:53:43.263418 systemd-logind[1457]: Removed session 4. Jul 2 01:53:43.332688 systemd[1]: Started sshd@2-10.200.20.48:22-10.200.16.10:54526.service. Jul 2 01:53:43.783982 sshd[1835]: Accepted publickey for core from 10.200.16.10 port 54526 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:43.785276 sshd[1835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:43.789455 systemd-logind[1457]: New session 5 of user core. Jul 2 01:53:43.789939 systemd[1]: Started session-5.scope. Jul 2 01:53:44.122593 sshd[1835]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:44.125470 systemd[1]: sshd@2-10.200.20.48:22-10.200.16.10:54526.service: Deactivated successfully. Jul 2 01:53:44.126113 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 01:53:44.126659 systemd-logind[1457]: Session 5 logged out. Waiting for processes to exit. Jul 2 01:53:44.127494 systemd-logind[1457]: Removed session 5. Jul 2 01:53:44.198103 systemd[1]: Started sshd@3-10.200.20.48:22-10.200.16.10:54540.service. Jul 2 01:53:44.649691 sshd[1844]: Accepted publickey for core from 10.200.16.10 port 54540 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:44.650992 sshd[1844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:44.654910 systemd-logind[1457]: New session 6 of user core. Jul 2 01:53:44.655388 systemd[1]: Started session-6.scope. Jul 2 01:53:44.987741 sshd[1844]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:44.990753 systemd[1]: sshd@3-10.200.20.48:22-10.200.16.10:54540.service: Deactivated successfully. Jul 2 01:53:44.991427 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 01:53:44.991954 systemd-logind[1457]: Session 6 logged out. Waiting for processes to exit. Jul 2 01:53:44.992825 systemd-logind[1457]: Removed session 6. Jul 2 01:53:45.068447 systemd[1]: Started sshd@4-10.200.20.48:22-10.200.16.10:54554.service. Jul 2 01:53:45.554854 sshd[1850]: Accepted publickey for core from 10.200.16.10 port 54554 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:45.556139 sshd[1850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:45.559939 systemd-logind[1457]: New session 7 of user core. Jul 2 01:53:45.560418 systemd[1]: Started session-7.scope. Jul 2 01:53:46.097418 sudo[1853]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 01:53:46.097647 sudo[1853]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:53:46.152523 dbus-daemon[1444]: avc: received setenforce notice (enforcing=1) Jul 2 01:53:46.153491 sudo[1853]: pam_unix(sudo:session): session closed for user root Jul 2 01:53:46.255297 sshd[1850]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:46.258736 systemd[1]: sshd@4-10.200.20.48:22-10.200.16.10:54554.service: Deactivated successfully. Jul 2 01:53:46.259564 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 01:53:46.260145 systemd-logind[1457]: Session 7 logged out. Waiting for processes to exit. Jul 2 01:53:46.261024 systemd-logind[1457]: Removed session 7. Jul 2 01:53:46.335825 systemd[1]: Started sshd@5-10.200.20.48:22-10.200.16.10:54560.service. Jul 2 01:53:46.521753 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Jul 2 01:53:46.521923 systemd[1]: Stopped kubelet.service. Jul 2 01:53:46.523347 systemd[1]: Starting kubelet.service... Jul 2 01:53:46.602345 systemd[1]: Started kubelet.service. Jul 2 01:53:46.817351 sshd[1857]: Accepted publickey for core from 10.200.16.10 port 54560 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:46.819216 sshd[1857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:46.823482 systemd[1]: Started session-8.scope. Jul 2 01:53:46.824801 systemd-logind[1457]: New session 8 of user core. Jul 2 01:53:47.088174 sudo[1871]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 01:53:47.088817 sudo[1871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:53:47.091591 sudo[1871]: pam_unix(sudo:session): session closed for user root Jul 2 01:53:47.096500 sudo[1870]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 01:53:47.096721 sudo[1870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:53:47.105857 systemd[1]: Stopping audit-rules.service... Jul 2 01:53:47.105000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:53:47.108506 auditctl[1874]: No rules Jul 2 01:53:47.110932 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 01:53:47.110984 kernel: audit: type=1305 audit(1719885227.105:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:53:47.111320 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 01:53:47.111512 systemd[1]: Stopped audit-rules.service. Jul 2 01:53:47.113220 systemd[1]: Starting audit-rules.service... Jul 2 01:53:47.105000 audit[1874]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcb88c3c0 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:47.143489 kernel: audit: type=1300 audit(1719885227.105:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcb88c3c0 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:47.105000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:53:47.150657 kernel: audit: type=1327 audit(1719885227.105:211): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:53:47.150734 kernel: audit: type=1131 audit(1719885227.110:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.187024 kubelet[1863]: E0702 01:53:47.186974 1863 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:53:47.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:53:47.189377 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:53:47.189504 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:53:47.205387 kernel: audit: type=1131 audit(1719885227.188:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:53:47.345964 augenrules[1891]: No rules Jul 2 01:53:47.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.346806 systemd[1]: Finished audit-rules.service. Jul 2 01:53:47.363194 sudo[1870]: pam_unix(sudo:session): session closed for user root Jul 2 01:53:47.362000 audit[1870]: USER_END pid=1870 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.383047 kernel: audit: type=1130 audit(1719885227.345:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.383528 kernel: audit: type=1106 audit(1719885227.362:215): pid=1870 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.383566 kernel: audit: type=1104 audit(1719885227.362:216): pid=1870 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.362000 audit[1870]: CRED_DISP pid=1870 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.450244 sshd[1857]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:47.449000 audit[1857]: USER_END pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:47.474131 systemd[1]: sshd@5-10.200.20.48:22-10.200.16.10:54560.service: Deactivated successfully. Jul 2 01:53:47.450000 audit[1857]: CRED_DISP pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:47.474428 kernel: audit: type=1106 audit(1719885227.449:217): pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:47.474866 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 01:53:47.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.48:22-10.200.16.10:54560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.492603 systemd-logind[1457]: Session 8 logged out. Waiting for processes to exit. Jul 2 01:53:47.493453 kernel: audit: type=1104 audit(1719885227.450:218): pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:47.493846 systemd-logind[1457]: Removed session 8. Jul 2 01:53:47.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.48:22-10.200.16.10:54562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:47.530157 systemd[1]: Started sshd@6-10.200.20.48:22-10.200.16.10:54562.service. Jul 2 01:53:48.010000 audit[1897]: USER_ACCT pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:48.011592 sshd[1897]: Accepted publickey for core from 10.200.16.10 port 54562 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:48.011000 audit[1897]: CRED_ACQ pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:48.011000 audit[1897]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3dffc70 a2=3 a3=1 items=0 ppid=1 pid=1897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:48.011000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:48.013195 sshd[1897]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:48.017433 systemd[1]: Started session-9.scope. Jul 2 01:53:48.018410 systemd-logind[1457]: New session 9 of user core. Jul 2 01:53:48.021000 audit[1897]: USER_START pid=1897 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:48.022000 audit[1899]: CRED_ACQ pid=1899 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:48.280000 audit[1900]: USER_ACCT pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:48.282467 sudo[1900]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 01:53:48.281000 audit[1900]: CRED_REFR pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:48.282697 sudo[1900]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:53:48.282000 audit[1900]: USER_START pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:48.294736 systemd[1]: Starting coreos-metadata.service... Jul 2 01:53:48.360396 coreos-metadata[1904]: Jul 02 01:53:48.360 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 01:53:48.363594 coreos-metadata[1904]: Jul 02 01:53:48.363 INFO Fetch successful Jul 2 01:53:48.363687 coreos-metadata[1904]: Jul 02 01:53:48.363 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Jul 2 01:53:48.365405 coreos-metadata[1904]: Jul 02 01:53:48.365 INFO Fetch successful Jul 2 01:53:48.366743 coreos-metadata[1904]: Jul 02 01:53:48.366 INFO Fetching http://168.63.129.16/machine/32a9802a-1c65-478f-a4a3-c15248a279db/21e779f8%2D8f75%2D4074%2Da1f3%2D9119a6b74b2a.%5Fci%2D3510.3.5%2Da%2D62a89fec45?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Jul 2 01:53:48.368669 coreos-metadata[1904]: Jul 02 01:53:48.368 INFO Fetch successful Jul 2 01:53:48.402911 coreos-metadata[1904]: Jul 02 01:53:48.402 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Jul 2 01:53:48.415137 coreos-metadata[1904]: Jul 02 01:53:48.415 INFO Fetch successful Jul 2 01:53:48.424084 systemd[1]: Finished coreos-metadata.service. Jul 2 01:53:48.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:51.993267 systemd[1]: Stopped kubelet.service. Jul 2 01:53:51.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:51.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:51.995457 systemd[1]: Starting kubelet.service... Jul 2 01:53:52.019381 systemd[1]: Reloading. Jul 2 01:53:52.116903 /usr/lib/systemd/system-generators/torcx-generator[1964]: time="2024-07-02T01:53:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:53:52.116938 /usr/lib/systemd/system-generators/torcx-generator[1964]: time="2024-07-02T01:53:52Z" level=info msg="torcx already run" Jul 2 01:53:52.182925 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:53:52.183164 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:53:52.200722 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:53:52.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.277161 kernel: kauditd_printk_skb: 15 callbacks suppressed Jul 2 01:53:52.277289 kernel: audit: type=1400 audit(1719885232.271:232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307944 kernel: audit: type=1400 audit(1719885232.272:233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.324109 kernel: audit: type=1400 audit(1719885232.272:234): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.338928 kernel: audit: type=1400 audit(1719885232.272:235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.355928 kernel: audit: type=1400 audit(1719885232.273:236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.356022 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 01:53:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.378362 kernel: audit: type=1400 audit(1719885232.273:237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.378472 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 01:53:52.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.400404 kernel: audit: type=1400 audit(1719885232.273:238): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.400515 kernel: audit: backlog limit exceeded Jul 2 01:53:52.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit: BPF prog-id=41 op=LOAD Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.290000 audit: BPF prog-id=42 op=LOAD Jul 2 01:53:52.290000 audit: BPF prog-id=24 op=UNLOAD Jul 2 01:53:52.290000 audit: BPF prog-id=25 op=UNLOAD Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.306000 audit: BPF prog-id=43 op=LOAD Jul 2 01:53:52.306000 audit: BPF prog-id=34 op=UNLOAD Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit: BPF prog-id=44 op=LOAD Jul 2 01:53:52.322000 audit: BPF prog-id=35 op=UNLOAD Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit: BPF prog-id=45 op=LOAD Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.337000 audit: BPF prog-id=46 op=LOAD Jul 2 01:53:52.337000 audit: BPF prog-id=36 op=UNLOAD Jul 2 01:53:52.337000 audit: BPF prog-id=37 op=UNLOAD Jul 2 01:53:52.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit: BPF prog-id=47 op=LOAD Jul 2 01:53:52.403000 audit: BPF prog-id=33 op=UNLOAD Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit: BPF prog-id=48 op=LOAD Jul 2 01:53:52.403000 audit: BPF prog-id=26 op=UNLOAD Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit: BPF prog-id=49 op=LOAD Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.403000 audit: BPF prog-id=50 op=LOAD Jul 2 01:53:52.403000 audit: BPF prog-id=27 op=UNLOAD Jul 2 01:53:52.403000 audit: BPF prog-id=28 op=UNLOAD Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.404000 audit: BPF prog-id=51 op=LOAD Jul 2 01:53:52.404000 audit: BPF prog-id=38 op=UNLOAD Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit: BPF prog-id=52 op=LOAD Jul 2 01:53:52.405000 audit: BPF prog-id=29 op=UNLOAD Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit: BPF prog-id=53 op=LOAD Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit: BPF prog-id=54 op=LOAD Jul 2 01:53:52.405000 audit: BPF prog-id=30 op=UNLOAD Jul 2 01:53:52.405000 audit: BPF prog-id=31 op=UNLOAD Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:52.405000 audit: BPF prog-id=55 op=LOAD Jul 2 01:53:52.405000 audit: BPF prog-id=40 op=UNLOAD Jul 2 01:53:52.433565 systemd[1]: Started kubelet.service. Jul 2 01:53:52.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:52.436422 systemd[1]: Stopping kubelet.service... Jul 2 01:53:52.437211 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 01:53:52.437468 systemd[1]: Stopped kubelet.service. Jul 2 01:53:52.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:52.439686 systemd[1]: Starting kubelet.service... Jul 2 01:53:52.881697 systemd[1]: Started kubelet.service. Jul 2 01:53:52.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:52.922375 kubelet[2028]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:53:52.922708 kubelet[2028]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 01:53:52.922752 kubelet[2028]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:53:52.922880 kubelet[2028]: I0702 01:53:52.922855 2028 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 01:53:53.956660 kubelet[2028]: I0702 01:53:53.956623 2028 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 01:53:53.956985 kubelet[2028]: I0702 01:53:53.956974 2028 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 01:53:53.957271 kubelet[2028]: I0702 01:53:53.957255 2028 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 01:53:53.972112 kubelet[2028]: I0702 01:53:53.972068 2028 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 01:53:53.980371 kubelet[2028]: I0702 01:53:53.980330 2028 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 01:53:53.981869 kubelet[2028]: I0702 01:53:53.981829 2028 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 01:53:53.982138 kubelet[2028]: I0702 01:53:53.981966 2028 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.48","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 01:53:53.982289 kubelet[2028]: I0702 01:53:53.982276 2028 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 01:53:53.982349 kubelet[2028]: I0702 01:53:53.982340 2028 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 01:53:53.982552 kubelet[2028]: I0702 01:53:53.982541 2028 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:53:53.983432 kubelet[2028]: I0702 01:53:53.983417 2028 kubelet.go:400] "Attempting to sync node with API server" Jul 2 01:53:53.983526 kubelet[2028]: I0702 01:53:53.983516 2028 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 01:53:53.983628 kubelet[2028]: I0702 01:53:53.983595 2028 kubelet.go:312] "Adding apiserver pod source" Jul 2 01:53:53.983697 kubelet[2028]: I0702 01:53:53.983688 2028 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 01:53:53.984945 kubelet[2028]: E0702 01:53:53.984918 2028 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:53.985709 kubelet[2028]: E0702 01:53:53.985689 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:53.986868 kubelet[2028]: I0702 01:53:53.986844 2028 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 01:53:53.987048 kubelet[2028]: I0702 01:53:53.987030 2028 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 01:53:53.987095 kubelet[2028]: W0702 01:53:53.987074 2028 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 01:53:53.987930 kubelet[2028]: I0702 01:53:53.987893 2028 server.go:1264] "Started kubelet" Jul 2 01:53:53.988296 kubelet[2028]: I0702 01:53:53.988265 2028 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 01:53:53.988553 kubelet[2028]: I0702 01:53:53.988496 2028 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 01:53:53.988893 kubelet[2028]: I0702 01:53:53.988858 2028 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 01:53:53.990439 kubelet[2028]: I0702 01:53:53.990415 2028 server.go:455] "Adding debug handlers to kubelet server" Jul 2 01:53:53.992000 audit[2028]: AVC avc: denied { mac_admin } for pid=2028 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:53.992000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:53:53.992000 audit[2028]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b775c0 a1=4000cf3a70 a2=4000b77590 a3=25 items=0 ppid=1 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:53.992000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:53:53.992000 audit[2028]: AVC avc: denied { mac_admin } for pid=2028 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:53.992000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:53:53.992000 audit[2028]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bd2720 a1=4000cf3a88 a2=4000b77650 a3=25 items=0 ppid=1 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:53.992000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:53:53.994755 kubelet[2028]: I0702 01:53:53.994321 2028 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 01:53:53.994755 kubelet[2028]: I0702 01:53:53.994412 2028 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 01:53:53.994755 kubelet[2028]: I0702 01:53:53.994495 2028 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 01:53:53.996382 kubelet[2028]: I0702 01:53:53.996343 2028 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 01:53:53.996708 kubelet[2028]: I0702 01:53:53.996688 2028 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 01:53:53.999000 audit[2038]: NETFILTER_CFG table=mangle:8 family=2 entries=2 op=nft_register_chain pid=2038 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:53.999000 audit[2038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff484d710 a2=0 a3=1 items=0 ppid=2028 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:53.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:53:54.001583 kubelet[2028]: I0702 01:53:54.001560 2028 reconciler.go:26] "Reconciler: start to sync state" Jul 2 01:53:54.003039 kubelet[2028]: I0702 01:53:54.003005 2028 factory.go:221] Registration of the systemd container factory successfully Jul 2 01:53:54.003131 kubelet[2028]: I0702 01:53:54.003110 2028 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 01:53:54.002000 audit[2039]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:54.002000 audit[2039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffe73cb050 a2=0 a3=1 items=0 ppid=2028 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:53:54.006025 kubelet[2028]: I0702 01:53:54.005998 2028 factory.go:221] Registration of the containerd container factory successfully Jul 2 01:53:54.005000 audit[2041]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:54.005000 audit[2041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc0954a00 a2=0 a3=1 items=0 ppid=2028 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:53:54.007000 audit[2043]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=2043 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:54.007000 audit[2043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc995f8e0 a2=0 a3=1 items=0 ppid=2028 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:53:54.028854 kubelet[2028]: W0702 01:53:54.028799 2028 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 01:53:54.031269 kubelet[2028]: E0702 01:53:54.031244 2028 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 01:53:54.033333 kubelet[2028]: W0702 01:53:54.029076 2028 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 01:53:54.033523 kubelet[2028]: W0702 01:53:54.029106 2028 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.20.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 01:53:54.033641 kubelet[2028]: E0702 01:53:54.033629 2028 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 01:53:54.033774 kubelet[2028]: E0702 01:53:54.033704 2028 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 01:53:54.033854 kubelet[2028]: E0702 01:53:54.029431 2028 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.48\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 2 01:53:54.033922 kubelet[2028]: E0702 01:53:54.031149 2028 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 01:53:54.034008 kubelet[2028]: E0702 01:53:54.029166 2028 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.48.17de42820a49602b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.48,UID:10.200.20.48,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.48,},FirstTimestamp:2024-07-02 01:53:53.987870763 +0000 UTC m=+1.101835578,LastTimestamp:2024-07-02 01:53:53.987870763 +0000 UTC m=+1.101835578,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.48,}" Jul 2 01:53:54.034172 kubelet[2028]: I0702 01:53:54.033656 2028 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 01:53:54.034239 kubelet[2028]: I0702 01:53:54.034228 2028 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 01:53:54.034297 kubelet[2028]: I0702 01:53:54.034289 2028 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:53:54.035579 kubelet[2028]: E0702 01:53:54.035477 2028 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.48.17de42820cdd88d2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.48,UID:10.200.20.48,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.200.20.48,},FirstTimestamp:2024-07-02 01:53:54.03113493 +0000 UTC m=+1.145099745,LastTimestamp:2024-07-02 01:53:54.03113493 +0000 UTC m=+1.145099745,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.48,}" Jul 2 01:53:54.040109 kubelet[2028]: I0702 01:53:54.040085 2028 policy_none.go:49] "None policy: Start" Jul 2 01:53:54.040895 kubelet[2028]: I0702 01:53:54.040879 2028 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 01:53:54.041030 kubelet[2028]: I0702 01:53:54.041020 2028 state_mem.go:35] "Initializing new in-memory state store" Jul 2 01:53:54.051791 systemd[1]: Created slice kubepods.slice. Jul 2 01:53:54.057036 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 01:53:54.060772 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 01:53:54.064000 audit[2051]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:54.064000 audit[2051]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe308e160 a2=0 a3=1 items=0 ppid=2028 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 01:53:54.066660 kubelet[2028]: I0702 01:53:54.066615 2028 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 01:53:54.068321 kubelet[2028]: I0702 01:53:54.068294 2028 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 01:53:54.066000 audit[2028]: AVC avc: denied { mac_admin } for pid=2028 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:54.066000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:53:54.066000 audit[2028]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dad740 a1=4000dda258 a2=4000dad710 a3=25 items=0 ppid=1 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.066000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:53:54.068626 kubelet[2028]: I0702 01:53:54.068384 2028 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 01:53:54.068626 kubelet[2028]: I0702 01:53:54.068504 2028 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 01:53:54.068626 kubelet[2028]: I0702 01:53:54.068610 2028 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 01:53:54.070000 audit[2052]: NETFILTER_CFG table=mangle:13 family=10 entries=2 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:53:54.070000 audit[2052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff1fb7620 a2=0 a3=1 items=0 ppid=2028 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:53:54.072898 kubelet[2028]: E0702 01:53:54.072876 2028 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.48\" not found" Jul 2 01:53:54.071000 audit[2053]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:54.071000 audit[2053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce053b70 a2=0 a3=1 items=0 ppid=2028 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:53:54.073682 kubelet[2028]: I0702 01:53:54.073662 2028 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 01:53:54.073803 kubelet[2028]: I0702 01:53:54.073795 2028 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 01:53:54.073881 kubelet[2028]: I0702 01:53:54.073872 2028 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 01:53:54.075043 kubelet[2028]: E0702 01:53:54.075021 2028 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 01:53:54.073000 audit[2054]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2054 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:53:54.073000 audit[2054]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffeba3a40 a2=0 a3=1 items=0 ppid=2028 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:53:54.074000 audit[2055]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:54.074000 audit[2055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc7659eb0 a2=0 a3=1 items=0 ppid=2028 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:53:54.075000 audit[2056]: NETFILTER_CFG table=nat:17 family=10 entries=2 op=nft_register_chain pid=2056 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:53:54.075000 audit[2056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffbb94fe0 a2=0 a3=1 items=0 ppid=2028 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:53:54.076000 audit[2057]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:53:54.076000 audit[2057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca08eb50 a2=0 a3=1 items=0 ppid=2028 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:53:54.077000 audit[2058]: NETFILTER_CFG table=filter:19 family=10 entries=2 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:53:54.077000 audit[2058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe43d7720 a2=0 a3=1 items=0 ppid=2028 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:54.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:53:54.098046 kubelet[2028]: I0702 01:53:54.098008 2028 kubelet_node_status.go:73] "Attempting to register node" node="10.200.20.48" Jul 2 01:53:54.101481 kubelet[2028]: I0702 01:53:54.101456 2028 kubelet_node_status.go:76] "Successfully registered node" node="10.200.20.48" Jul 2 01:53:54.110614 kubelet[2028]: E0702 01:53:54.110587 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.211311 kubelet[2028]: E0702 01:53:54.211203 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.312283 kubelet[2028]: E0702 01:53:54.312254 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.400192 sudo[1900]: pam_unix(sudo:session): session closed for user root Jul 2 01:53:54.398000 audit[1900]: USER_END pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:54.398000 audit[1900]: CRED_DISP pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:53:54.413591 kubelet[2028]: E0702 01:53:54.413562 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.487595 sshd[1897]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:54.487000 audit[1897]: USER_END pid=1897 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:54.487000 audit[1897]: CRED_DISP pid=1897 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:54.490442 systemd[1]: sshd@6-10.200.20.48:22-10.200.16.10:54562.service: Deactivated successfully. Jul 2 01:53:54.491189 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 01:53:54.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.48:22-10.200.16.10:54562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:54.492191 systemd-logind[1457]: Session 9 logged out. Waiting for processes to exit. Jul 2 01:53:54.493314 systemd-logind[1457]: Removed session 9. Jul 2 01:53:54.514256 kubelet[2028]: E0702 01:53:54.514224 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.614664 kubelet[2028]: E0702 01:53:54.614637 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.715116 kubelet[2028]: E0702 01:53:54.715085 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.815569 kubelet[2028]: E0702 01:53:54.815541 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.916370 kubelet[2028]: E0702 01:53:54.916324 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:54.959565 kubelet[2028]: I0702 01:53:54.959541 2028 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 01:53:54.959847 kubelet[2028]: W0702 01:53:54.959694 2028 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 2 01:53:54.959847 kubelet[2028]: W0702 01:53:54.959726 2028 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 2 01:53:54.986703 kubelet[2028]: E0702 01:53:54.986676 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:55.017157 kubelet[2028]: E0702 01:53:55.017130 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:55.117999 kubelet[2028]: E0702 01:53:55.117909 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:55.218353 kubelet[2028]: E0702 01:53:55.218320 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:55.318789 kubelet[2028]: E0702 01:53:55.318765 2028 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.20.48\" not found" Jul 2 01:53:55.419617 kubelet[2028]: I0702 01:53:55.419512 2028 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 01:53:55.420013 env[1467]: time="2024-07-02T01:53:55.419974424Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 01:53:55.420292 kubelet[2028]: I0702 01:53:55.420169 2028 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 01:53:55.987038 kubelet[2028]: E0702 01:53:55.987010 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:55.987376 kubelet[2028]: I0702 01:53:55.987036 2028 apiserver.go:52] "Watching apiserver" Jul 2 01:53:55.991483 kubelet[2028]: I0702 01:53:55.991435 2028 topology_manager.go:215] "Topology Admit Handler" podUID="b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9" podNamespace="calico-system" podName="calico-node-g49zv" Jul 2 01:53:55.991614 kubelet[2028]: I0702 01:53:55.991567 2028 topology_manager.go:215] "Topology Admit Handler" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" podNamespace="calico-system" podName="csi-node-driver-6ktr5" Jul 2 01:53:55.991664 kubelet[2028]: I0702 01:53:55.991646 2028 topology_manager.go:215] "Topology Admit Handler" podUID="d6688c30-ed30-4558-aa9d-8334f55e3eef" podNamespace="kube-system" podName="kube-proxy-r5r68" Jul 2 01:53:55.991898 kubelet[2028]: E0702 01:53:55.991868 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:53:55.998738 systemd[1]: Created slice kubepods-besteffort-podd6688c30_ed30_4558_aa9d_8334f55e3eef.slice. Jul 2 01:53:56.001310 kubelet[2028]: I0702 01:53:56.001288 2028 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 01:53:56.010100 kubelet[2028]: I0702 01:53:56.010055 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d6688c30-ed30-4558-aa9d-8334f55e3eef-lib-modules\") pod \"kube-proxy-r5r68\" (UID: \"d6688c30-ed30-4558-aa9d-8334f55e3eef\") " pod="kube-system/kube-proxy-r5r68" Jul 2 01:53:56.010288 kubelet[2028]: I0702 01:53:56.010274 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-cni-bin-dir\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.010385 kubelet[2028]: I0702 01:53:56.010369 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5f879095-b675-45e1-a885-f0c2f5daa680-socket-dir\") pod \"csi-node-driver-6ktr5\" (UID: \"5f879095-b675-45e1-a885-f0c2f5daa680\") " pod="calico-system/csi-node-driver-6ktr5" Jul 2 01:53:56.010452 kubelet[2028]: I0702 01:53:56.010442 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d6688c30-ed30-4558-aa9d-8334f55e3eef-xtables-lock\") pod \"kube-proxy-r5r68\" (UID: \"d6688c30-ed30-4558-aa9d-8334f55e3eef\") " pod="kube-system/kube-proxy-r5r68" Jul 2 01:53:56.010522 kubelet[2028]: I0702 01:53:56.010509 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-cni-log-dir\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.010619 kubelet[2028]: I0702 01:53:56.010605 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-flexvol-driver-host\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.010685 kubelet[2028]: I0702 01:53:56.010674 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5f879095-b675-45e1-a885-f0c2f5daa680-varrun\") pod \"csi-node-driver-6ktr5\" (UID: \"5f879095-b675-45e1-a885-f0c2f5daa680\") " pod="calico-system/csi-node-driver-6ktr5" Jul 2 01:53:56.010750 kubelet[2028]: I0702 01:53:56.010739 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s8vxw\" (UniqueName: \"kubernetes.io/projected/d6688c30-ed30-4558-aa9d-8334f55e3eef-kube-api-access-s8vxw\") pod \"kube-proxy-r5r68\" (UID: \"d6688c30-ed30-4558-aa9d-8334f55e3eef\") " pod="kube-system/kube-proxy-r5r68" Jul 2 01:53:56.010824 kubelet[2028]: I0702 01:53:56.010812 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-xtables-lock\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.010885 kubelet[2028]: I0702 01:53:56.010874 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-var-lib-calico\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.010956 kubelet[2028]: I0702 01:53:56.010945 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-cni-net-dir\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.011024 kubelet[2028]: I0702 01:53:56.011011 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j9vj8\" (UniqueName: \"kubernetes.io/projected/5f879095-b675-45e1-a885-f0c2f5daa680-kube-api-access-j9vj8\") pod \"csi-node-driver-6ktr5\" (UID: \"5f879095-b675-45e1-a885-f0c2f5daa680\") " pod="calico-system/csi-node-driver-6ktr5" Jul 2 01:53:56.011133 kubelet[2028]: I0702 01:53:56.011088 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-tigera-ca-bundle\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.011218 kubelet[2028]: I0702 01:53:56.011204 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-node-certs\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.011293 kubelet[2028]: I0702 01:53:56.011282 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5f879095-b675-45e1-a885-f0c2f5daa680-registration-dir\") pod \"csi-node-driver-6ktr5\" (UID: \"5f879095-b675-45e1-a885-f0c2f5daa680\") " pod="calico-system/csi-node-driver-6ktr5" Jul 2 01:53:56.011382 kubelet[2028]: I0702 01:53:56.011369 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cz49l\" (UniqueName: \"kubernetes.io/projected/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-kube-api-access-cz49l\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.011454 kubelet[2028]: I0702 01:53:56.011443 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5f879095-b675-45e1-a885-f0c2f5daa680-kubelet-dir\") pod \"csi-node-driver-6ktr5\" (UID: \"5f879095-b675-45e1-a885-f0c2f5daa680\") " pod="calico-system/csi-node-driver-6ktr5" Jul 2 01:53:56.011537 kubelet[2028]: I0702 01:53:56.011526 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d6688c30-ed30-4558-aa9d-8334f55e3eef-kube-proxy\") pod \"kube-proxy-r5r68\" (UID: \"d6688c30-ed30-4558-aa9d-8334f55e3eef\") " pod="kube-system/kube-proxy-r5r68" Jul 2 01:53:56.011606 kubelet[2028]: I0702 01:53:56.011591 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-lib-modules\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.011679 kubelet[2028]: I0702 01:53:56.011666 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-policysync\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.011986 kubelet[2028]: I0702 01:53:56.011965 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9-var-run-calico\") pod \"calico-node-g49zv\" (UID: \"b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9\") " pod="calico-system/calico-node-g49zv" Jul 2 01:53:56.015020 systemd[1]: Created slice kubepods-besteffort-podb1f33aa9_4d4c_4ea5_b230_bf83d42e86e9.slice. Jul 2 01:53:56.115249 kubelet[2028]: E0702 01:53:56.115225 2028 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:53:56.115412 kubelet[2028]: W0702 01:53:56.115397 2028 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:53:56.115508 kubelet[2028]: E0702 01:53:56.115494 2028 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:53:56.125076 kubelet[2028]: E0702 01:53:56.125053 2028 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:53:56.125209 kubelet[2028]: W0702 01:53:56.125195 2028 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:53:56.125271 kubelet[2028]: E0702 01:53:56.125258 2028 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:53:56.125864 kubelet[2028]: E0702 01:53:56.125850 2028 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:53:56.125957 kubelet[2028]: W0702 01:53:56.125945 2028 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:53:56.126017 kubelet[2028]: E0702 01:53:56.126006 2028 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:53:56.131769 kubelet[2028]: E0702 01:53:56.131738 2028 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:53:56.131925 kubelet[2028]: W0702 01:53:56.131910 2028 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:53:56.132008 kubelet[2028]: E0702 01:53:56.131997 2028 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:53:56.133997 kubelet[2028]: E0702 01:53:56.133974 2028 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:53:56.134148 kubelet[2028]: W0702 01:53:56.134133 2028 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:53:56.134234 kubelet[2028]: E0702 01:53:56.134222 2028 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:53:56.314186 env[1467]: time="2024-07-02T01:53:56.313840094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r5r68,Uid:d6688c30-ed30-4558-aa9d-8334f55e3eef,Namespace:kube-system,Attempt:0,}" Jul 2 01:53:56.319225 env[1467]: time="2024-07-02T01:53:56.319170312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-g49zv,Uid:b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9,Namespace:calico-system,Attempt:0,}" Jul 2 01:53:56.987792 kubelet[2028]: E0702 01:53:56.987761 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:57.075206 kubelet[2028]: E0702 01:53:57.075152 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:53:57.989256 kubelet[2028]: E0702 01:53:57.989215 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:58.989875 kubelet[2028]: E0702 01:53:58.989827 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:59.075828 kubelet[2028]: E0702 01:53:59.075455 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:53:59.711183 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1759224305.mount: Deactivated successfully. Jul 2 01:53:59.738091 env[1467]: time="2024-07-02T01:53:59.738027562Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.744966 env[1467]: time="2024-07-02T01:53:59.744921639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.748880 env[1467]: time="2024-07-02T01:53:59.748846745Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.755080 env[1467]: time="2024-07-02T01:53:59.755045130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.760392 env[1467]: time="2024-07-02T01:53:59.760338019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.763772 env[1467]: time="2024-07-02T01:53:59.763744237Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.770025 env[1467]: time="2024-07-02T01:53:59.769977342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.777957 env[1467]: time="2024-07-02T01:53:59.777916876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:53:59.814758 env[1467]: time="2024-07-02T01:53:59.814591816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:53:59.814758 env[1467]: time="2024-07-02T01:53:59.814629257Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:53:59.814758 env[1467]: time="2024-07-02T01:53:59.814639017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:53:59.814948 env[1467]: time="2024-07-02T01:53:59.814796340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33dc37c324fe32fe6f2b39f1f91a9e8c8e6821ca90ce4de0554e273ab88837ce pid=2078 runtime=io.containerd.runc.v2 Jul 2 01:53:59.836146 systemd[1]: Started cri-containerd-33dc37c324fe32fe6f2b39f1f91a9e8c8e6821ca90ce4de0554e273ab88837ce.scope. Jul 2 01:53:59.841839 env[1467]: time="2024-07-02T01:53:59.836685990Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:53:59.841839 env[1467]: time="2024-07-02T01:53:59.839880124Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:53:59.841839 env[1467]: time="2024-07-02T01:53:59.839938525Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:53:59.843926 env[1467]: time="2024-07-02T01:53:59.843539466Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7 pid=2105 runtime=io.containerd.runc.v2 Jul 2 01:53:59.872271 kernel: kauditd_printk_skb: 220 callbacks suppressed Jul 2 01:53:59.872456 kernel: audit: type=1400 audit(1719885239.850:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.890528 kernel: audit: type=1400 audit(1719885239.850:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.877833 systemd[1]: Started cri-containerd-5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7.scope. Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.909510 kernel: audit: type=1400 audit(1719885239.850:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.931376 kernel: audit: type=1400 audit(1719885239.850:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.931481 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.952977 kernel: audit: type=1400 audit(1719885239.850:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.953078 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.974757 kernel: audit: type=1400 audit(1719885239.850:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.974868 kernel: audit: backlog limit exceeded Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.979080 kernel: audit: type=1400 audit(1719885239.850:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.995004 kubelet[2028]: E0702 01:53:59.994937 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.854000 audit: BPF prog-id=56 op=LOAD Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2078 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646333376333323466653332666536663262333966316639316139 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2078 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646333376333323466653332666536663262333966316639316139 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.855000 audit: BPF prog-id=57 op=LOAD Jul 2 01:53:59.855000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2078 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646333376333323466653332666536663262333966316639316139 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.879000 audit: BPF prog-id=58 op=LOAD Jul 2 01:53:59.879000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2078 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646333376333323466653332666536663262333966316639316139 Jul 2 01:53:59.894000 audit: BPF prog-id=58 op=UNLOAD Jul 2 01:53:59.894000 audit: BPF prog-id=57 op=UNLOAD Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.894000 audit: BPF prog-id=59 op=LOAD Jul 2 01:53:59.894000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2078 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646333376333323466653332666536663262333966316639316139 Jul 2 01:53:59.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.997000 audit: BPF prog-id=60 op=LOAD Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565396337633634366461636564646365663161353738306263356461 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565396337633634366461636564646365663161353738306263356461 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit: BPF prog-id=61 op=LOAD Jul 2 01:53:59.998000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565396337633634366461636564646365663161353738306263356461 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit: BPF prog-id=62 op=LOAD Jul 2 01:53:59.998000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565396337633634366461636564646365663161353738306263356461 Jul 2 01:53:59.998000 audit: BPF prog-id=62 op=UNLOAD Jul 2 01:53:59.998000 audit: BPF prog-id=61 op=UNLOAD Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:53:59.998000 audit: BPF prog-id=63 op=LOAD Jul 2 01:53:59.998000 audit[2118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2105 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:59.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565396337633634366461636564646365663161353738306263356461 Jul 2 01:54:00.017286 env[1467]: time="2024-07-02T01:54:00.017233555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r5r68,Uid:d6688c30-ed30-4558-aa9d-8334f55e3eef,Namespace:kube-system,Attempt:0,} returns sandbox id \"33dc37c324fe32fe6f2b39f1f91a9e8c8e6821ca90ce4de0554e273ab88837ce\"" Jul 2 01:54:00.018311 env[1467]: time="2024-07-02T01:54:00.018274172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-g49zv,Uid:b1f33aa9-4d4c-4ea5-b230-bf83d42e86e9,Namespace:calico-system,Attempt:0,} returns sandbox id \"5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7\"" Jul 2 01:54:00.020321 env[1467]: time="2024-07-02T01:54:00.020263164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 01:54:00.995677 kubelet[2028]: E0702 01:54:00.995633 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:01.075570 kubelet[2028]: E0702 01:54:01.075500 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:54:01.182481 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2734311343.mount: Deactivated successfully. Jul 2 01:54:01.338300 env[1467]: time="2024-07-02T01:54:01.338250816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:01.345459 env[1467]: time="2024-07-02T01:54:01.345409851Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:01.350001 env[1467]: time="2024-07-02T01:54:01.349968804Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:01.354335 env[1467]: time="2024-07-02T01:54:01.354293753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:01.354984 env[1467]: time="2024-07-02T01:54:01.354956643Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 01:54:01.357417 env[1467]: time="2024-07-02T01:54:01.356599030Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 01:54:01.357662 env[1467]: time="2024-07-02T01:54:01.357622286Z" level=info msg="CreateContainer within sandbox \"5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 01:54:01.385633 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount774106312.mount: Deactivated successfully. Jul 2 01:54:01.401461 env[1467]: time="2024-07-02T01:54:01.401394987Z" level=info msg="CreateContainer within sandbox \"5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1108b4785d5e342580926ec91f4185609db5038e4f83a49d220e1496db156ec2\"" Jul 2 01:54:01.402303 env[1467]: time="2024-07-02T01:54:01.402268761Z" level=info msg="StartContainer for \"1108b4785d5e342580926ec91f4185609db5038e4f83a49d220e1496db156ec2\"" Jul 2 01:54:01.420406 systemd[1]: Started cri-containerd-1108b4785d5e342580926ec91f4185609db5038e4f83a49d220e1496db156ec2.scope. Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2105 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:01.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303862343738356435653334323538303932366563393166343138 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.436000 audit: BPF prog-id=64 op=LOAD Jul 2 01:54:01.436000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2105 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:01.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303862343738356435653334323538303932366563393166343138 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.437000 audit: BPF prog-id=65 op=LOAD Jul 2 01:54:01.437000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2105 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:01.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303862343738356435653334323538303932366563393166343138 Jul 2 01:54:01.438000 audit: BPF prog-id=65 op=UNLOAD Jul 2 01:54:01.438000 audit: BPF prog-id=64 op=UNLOAD Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:01.438000 audit: BPF prog-id=66 op=LOAD Jul 2 01:54:01.438000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2105 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:01.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303862343738356435653334323538303932366563393166343138 Jul 2 01:54:01.461453 systemd[1]: cri-containerd-1108b4785d5e342580926ec91f4185609db5038e4f83a49d220e1496db156ec2.scope: Deactivated successfully. Jul 2 01:54:01.463916 env[1467]: time="2024-07-02T01:54:01.463873507Z" level=info msg="StartContainer for \"1108b4785d5e342580926ec91f4185609db5038e4f83a49d220e1496db156ec2\" returns successfully" Jul 2 01:54:01.463000 audit: BPF prog-id=66 op=UNLOAD Jul 2 01:54:01.717196 env[1467]: time="2024-07-02T01:54:01.716129705Z" level=info msg="shim disconnected" id=1108b4785d5e342580926ec91f4185609db5038e4f83a49d220e1496db156ec2 Jul 2 01:54:01.717431 env[1467]: time="2024-07-02T01:54:01.717400686Z" level=warning msg="cleaning up after shim disconnected" id=1108b4785d5e342580926ec91f4185609db5038e4f83a49d220e1496db156ec2 namespace=k8s.io Jul 2 01:54:01.717431 env[1467]: time="2024-07-02T01:54:01.717428526Z" level=info msg="cleaning up dead shim" Jul 2 01:54:01.724905 env[1467]: time="2024-07-02T01:54:01.724855765Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:54:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2199 runtime=io.containerd.runc.v2\n" Jul 2 01:54:01.996800 kubelet[2028]: E0702 01:54:01.996538 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:02.826200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2637820517.mount: Deactivated successfully. Jul 2 01:54:02.997234 kubelet[2028]: E0702 01:54:02.997181 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:03.075302 kubelet[2028]: E0702 01:54:03.074969 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:54:03.286885 env[1467]: time="2024-07-02T01:54:03.286840023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:03.293979 env[1467]: time="2024-07-02T01:54:03.293941011Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:03.296655 env[1467]: time="2024-07-02T01:54:03.296622611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:03.300247 env[1467]: time="2024-07-02T01:54:03.300211746Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:03.300577 env[1467]: time="2024-07-02T01:54:03.300545431Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae\"" Jul 2 01:54:03.302330 env[1467]: time="2024-07-02T01:54:03.302301257Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 01:54:03.303461 env[1467]: time="2024-07-02T01:54:03.303433635Z" level=info msg="CreateContainer within sandbox \"33dc37c324fe32fe6f2b39f1f91a9e8c8e6821ca90ce4de0554e273ab88837ce\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 01:54:03.328310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount510884524.mount: Deactivated successfully. Jul 2 01:54:03.332154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2143316569.mount: Deactivated successfully. Jul 2 01:54:03.346058 env[1467]: time="2024-07-02T01:54:03.346013760Z" level=info msg="CreateContainer within sandbox \"33dc37c324fe32fe6f2b39f1f91a9e8c8e6821ca90ce4de0554e273ab88837ce\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c0326a1053f3970b1da28db66e4f361779d637c36417e1494717998818cd43a1\"" Jul 2 01:54:03.347044 env[1467]: time="2024-07-02T01:54:03.347010695Z" level=info msg="StartContainer for \"c0326a1053f3970b1da28db66e4f361779d637c36417e1494717998818cd43a1\"" Jul 2 01:54:03.361623 systemd[1]: Started cri-containerd-c0326a1053f3970b1da28db66e4f361779d637c36417e1494717998818cd43a1.scope. Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2078 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333236613130353366333937306231646132386462363665346633 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit: BPF prog-id=67 op=LOAD Jul 2 01:54:03.379000 audit[2225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2078 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333236613130353366333937306231646132386462363665346633 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit: BPF prog-id=68 op=LOAD Jul 2 01:54:03.379000 audit[2225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2078 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333236613130353366333937306231646132386462363665346633 Jul 2 01:54:03.379000 audit: BPF prog-id=68 op=UNLOAD Jul 2 01:54:03.379000 audit: BPF prog-id=67 op=UNLOAD Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:03.379000 audit: BPF prog-id=69 op=LOAD Jul 2 01:54:03.379000 audit[2225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2078 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333236613130353366333937306231646132386462363665346633 Jul 2 01:54:03.401383 env[1467]: time="2024-07-02T01:54:03.401306639Z" level=info msg="StartContainer for \"c0326a1053f3970b1da28db66e4f361779d637c36417e1494717998818cd43a1\" returns successfully" Jul 2 01:54:03.451000 audit[2275]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.451000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff66ad350 a2=0 a3=1 items=0 ppid=2235 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:54:03.452000 audit[2276]: NETFILTER_CFG table=mangle:21 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.452000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcf817900 a2=0 a3=1 items=0 ppid=2235 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:54:03.453000 audit[2277]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.453000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1858460 a2=0 a3=1 items=0 ppid=2235 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:54:03.454000 audit[2278]: NETFILTER_CFG table=nat:23 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.454000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeda2d830 a2=0 a3=1 items=0 ppid=2235 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.454000 audit[2279]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:54:03.454000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcaac1b00 a2=0 a3=1 items=0 ppid=2235 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:54:03.456000 audit[2280]: NETFILTER_CFG table=filter:25 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.456000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1048950 a2=0 a3=1 items=0 ppid=2235 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:54:03.558000 audit[2281]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.558000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff8d3f150 a2=0 a3=1 items=0 ppid=2235 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:54:03.562000 audit[2283]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.562000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffea630da0 a2=0 a3=1 items=0 ppid=2235 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 01:54:03.566000 audit[2286]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.566000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffff22dc90 a2=0 a3=1 items=0 ppid=2235 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 01:54:03.567000 audit[2287]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.567000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8bf0040 a2=0 a3=1 items=0 ppid=2235 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:54:03.569000 audit[2289]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.569000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffef000fd0 a2=0 a3=1 items=0 ppid=2235 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:54:03.570000 audit[2290]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.570000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc6243d0 a2=0 a3=1 items=0 ppid=2235 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:54:03.572000 audit[2292]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.572000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc3e11420 a2=0 a3=1 items=0 ppid=2235 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:54:03.577000 audit[2295]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.577000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe3c9430 a2=0 a3=1 items=0 ppid=2235 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 01:54:03.578000 audit[2296]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.578000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffecb22ca0 a2=0 a3=1 items=0 ppid=2235 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:54:03.580000 audit[2298]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.580000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdcfe2aa0 a2=0 a3=1 items=0 ppid=2235 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:54:03.581000 audit[2299]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.581000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5049590 a2=0 a3=1 items=0 ppid=2235 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:54:03.583000 audit[2301]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.583000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2f70680 a2=0 a3=1 items=0 ppid=2235 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:54:03.587000 audit[2304]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.587000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff738760 a2=0 a3=1 items=0 ppid=2235 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:54:03.590000 audit[2307]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.590000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffbec59a0 a2=0 a3=1 items=0 ppid=2235 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:54:03.595000 audit[2308]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.595000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe7ad85a0 a2=0 a3=1 items=0 ppid=2235 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:54:03.597000 audit[2310]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.597000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdcf48c30 a2=0 a3=1 items=0 ppid=2235 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:03.662000 audit[2315]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.662000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc35c8bb0 a2=0 a3=1 items=0 ppid=2235 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:03.663000 audit[2316]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.663000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc31e2630 a2=0 a3=1 items=0 ppid=2235 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:54:03.666000 audit[2318]: NETFILTER_CFG table=nat:44 family=2 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:54:03.666000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe44b5b90 a2=0 a3=1 items=0 ppid=2235 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:54:03.690000 audit[2324]: NETFILTER_CFG table=filter:45 family=2 entries=5 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:03.690000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffed624340 a2=0 a3=1 items=0 ppid=2235 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:03.797000 audit[2324]: NETFILTER_CFG table=nat:46 family=2 entries=65 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:03.797000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffed624340 a2=0 a3=1 items=0 ppid=2235 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:03.863000 audit[2332]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.863000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffedbbbd50 a2=0 a3=1 items=0 ppid=2235 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:54:03.869000 audit[2334]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.869000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffe388b70 a2=0 a3=1 items=0 ppid=2235 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 01:54:03.875000 audit[2337]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.875000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd8ae2130 a2=0 a3=1 items=0 ppid=2235 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 01:54:03.876000 audit[2338]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.876000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd073d1c0 a2=0 a3=1 items=0 ppid=2235 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:54:03.878000 audit[2340]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.878000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcdce8130 a2=0 a3=1 items=0 ppid=2235 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:54:03.880000 audit[2341]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.880000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2bc18b0 a2=0 a3=1 items=0 ppid=2235 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:54:03.883000 audit[2343]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.883000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff338a2f0 a2=0 a3=1 items=0 ppid=2235 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 01:54:03.887000 audit[2346]: NETFILTER_CFG table=filter:54 family=10 entries=2 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.887000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff51fc510 a2=0 a3=1 items=0 ppid=2235 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:54:03.889000 audit[2347]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.889000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6856030 a2=0 a3=1 items=0 ppid=2235 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:54:03.891000 audit[2349]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.891000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff864f240 a2=0 a3=1 items=0 ppid=2235 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:54:03.892000 audit[2350]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.892000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3889f00 a2=0 a3=1 items=0 ppid=2235 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:54:03.895000 audit[2352]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.895000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcb834640 a2=0 a3=1 items=0 ppid=2235 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:54:03.898000 audit[2355]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.898000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff033db00 a2=0 a3=1 items=0 ppid=2235 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:54:03.901000 audit[2358]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.901000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2e6e460 a2=0 a3=1 items=0 ppid=2235 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 01:54:03.903000 audit[2359]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.903000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc6da0200 a2=0 a3=1 items=0 ppid=2235 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:54:03.905000 audit[2361]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.905000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdcbfa200 a2=0 a3=1 items=0 ppid=2235 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:03.908000 audit[2364]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.908000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdd3d7c80 a2=0 a3=1 items=0 ppid=2235 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:54:03.909000 audit[2365]: NETFILTER_CFG table=nat:64 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.909000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff03e0160 a2=0 a3=1 items=0 ppid=2235 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:54:03.911000 audit[2367]: NETFILTER_CFG table=nat:65 family=10 entries=2 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.911000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff3bc1960 a2=0 a3=1 items=0 ppid=2235 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:54:03.912000 audit[2368]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.912000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc73cc7e0 a2=0 a3=1 items=0 ppid=2235 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:54:03.914000 audit[2370]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.914000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff20fa0d0 a2=0 a3=1 items=0 ppid=2235 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:54:03.917000 audit[2373]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:54:03.917000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcb4eabb0 a2=0 a3=1 items=0 ppid=2235 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:54:03.920000 audit[2375]: NETFILTER_CFG table=filter:69 family=10 entries=3 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:54:03.920000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffe9f372f0 a2=0 a3=1 items=0 ppid=2235 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.920000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:03.920000 audit[2375]: NETFILTER_CFG table=nat:70 family=10 entries=7 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:54:03.920000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe9f372f0 a2=0 a3=1 items=0 ppid=2235 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.920000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:03.998135 kubelet[2028]: E0702 01:54:03.998085 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:04.106341 kubelet[2028]: I0702 01:54:04.106258 2028 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-r5r68" podStartSLOduration=6.825372374 podStartE2EDuration="10.106239529s" podCreationTimestamp="2024-07-02 01:53:54 +0000 UTC" firstStartedPulling="2024-07-02 01:54:00.02062521 +0000 UTC m=+7.134590025" lastFinishedPulling="2024-07-02 01:54:03.301492365 +0000 UTC m=+10.415457180" observedRunningTime="2024-07-02 01:54:04.106218609 +0000 UTC m=+11.220183424" watchObservedRunningTime="2024-07-02 01:54:04.106239529 +0000 UTC m=+11.220204344" Jul 2 01:54:04.998448 kubelet[2028]: E0702 01:54:04.998405 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:05.075757 kubelet[2028]: E0702 01:54:05.075410 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:54:05.999043 kubelet[2028]: E0702 01:54:05.998992 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:06.999993 kubelet[2028]: E0702 01:54:06.999943 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:07.075620 kubelet[2028]: E0702 01:54:07.075539 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:54:07.092516 env[1467]: time="2024-07-02T01:54:07.092457212Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:07.098778 env[1467]: time="2024-07-02T01:54:07.098736738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:07.102944 env[1467]: time="2024-07-02T01:54:07.102907355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:07.108650 env[1467]: time="2024-07-02T01:54:07.108600432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:07.109463 env[1467]: time="2024-07-02T01:54:07.109434884Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 01:54:07.112100 env[1467]: time="2024-07-02T01:54:07.112070600Z" level=info msg="CreateContainer within sandbox \"5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 01:54:07.136225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2052634150.mount: Deactivated successfully. Jul 2 01:54:07.152867 env[1467]: time="2024-07-02T01:54:07.152774755Z" level=info msg="CreateContainer within sandbox \"5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6\"" Jul 2 01:54:07.153345 env[1467]: time="2024-07-02T01:54:07.153319082Z" level=info msg="StartContainer for \"dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6\"" Jul 2 01:54:07.176052 systemd[1]: Started cri-containerd-dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6.scope. Jul 2 01:54:07.179746 systemd[1]: run-containerd-runc-k8s.io-dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6-runc.9szsn9.mount: Deactivated successfully. Jul 2 01:54:07.217598 kernel: kauditd_printk_skb: 346 callbacks suppressed Jul 2 01:54:07.217734 kernel: audit: type=1400 audit(1719885247.194:525): avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2105 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:07.243280 kernel: audit: type=1300 audit(1719885247.194:525): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2105 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633436333964616661323034636134353463646465613937303364 Jul 2 01:54:07.267336 kernel: audit: type=1327 audit(1719885247.194:525): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633436333964616661323034636134353463646465613937303364 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.285246 kernel: audit: type=1400 audit(1719885247.194:526): avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.305642 kernel: audit: type=1400 audit(1719885247.194:526): avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.311702 env[1467]: time="2024-07-02T01:54:07.311653242Z" level=info msg="StartContainer for \"dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6\" returns successfully" Jul 2 01:54:07.322971 kernel: audit: type=1400 audit(1719885247.194:526): avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.323104 kernel: audit: type=1400 audit(1719885247.194:526): avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.357193 kernel: audit: type=1400 audit(1719885247.194:526): avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.357298 kernel: audit: type=1400 audit(1719885247.194:526): avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.390971 kernel: audit: type=1400 audit(1719885247.194:526): avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.194000 audit: BPF prog-id=70 op=LOAD Jul 2 01:54:07.194000 audit[2383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2105 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633436333964616661323034636134353463646465613937303364 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.200000 audit: BPF prog-id=71 op=LOAD Jul 2 01:54:07.200000 audit[2383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2105 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:07.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633436333964616661323034636134353463646465613937303364 Jul 2 01:54:07.216000 audit: BPF prog-id=71 op=UNLOAD Jul 2 01:54:07.216000 audit: BPF prog-id=70 op=UNLOAD Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { perfmon } for pid=2383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit[2383]: AVC avc: denied { bpf } for pid=2383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:07.216000 audit: BPF prog-id=72 op=LOAD Jul 2 01:54:07.216000 audit[2383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2105 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:07.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633436333964616661323034636134353463646465613937303364 Jul 2 01:54:08.000493 kubelet[2028]: E0702 01:54:08.000452 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:09.001411 kubelet[2028]: E0702 01:54:09.001352 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:09.075047 kubelet[2028]: E0702 01:54:09.074984 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:54:09.233273 env[1467]: time="2024-07-02T01:54:09.233218775Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:54:09.235400 systemd[1]: cri-containerd-dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6.scope: Deactivated successfully. Jul 2 01:54:09.238000 audit: BPF prog-id=72 op=UNLOAD Jul 2 01:54:09.254476 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6-rootfs.mount: Deactivated successfully. Jul 2 01:54:09.302011 kubelet[2028]: I0702 01:54:09.301983 2028 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 01:54:10.002212 kubelet[2028]: E0702 01:54:10.002164 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:11.003232 kubelet[2028]: E0702 01:54:11.003182 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:11.079643 systemd[1]: Created slice kubepods-besteffort-pod5f879095_b675_45e1_a885_f0c2f5daa680.slice. Jul 2 01:54:11.082114 env[1467]: time="2024-07-02T01:54:11.082074683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ktr5,Uid:5f879095-b675-45e1-a885-f0c2f5daa680,Namespace:calico-system,Attempt:0,}" Jul 2 01:54:12.003694 kubelet[2028]: E0702 01:54:12.003610 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:12.633109 env[1467]: time="2024-07-02T01:54:12.633055112Z" level=info msg="shim disconnected" id=dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6 Jul 2 01:54:12.633109 env[1467]: time="2024-07-02T01:54:12.633106272Z" level=warning msg="cleaning up after shim disconnected" id=dec4639dafa204ca454cddea9703dadcacb933a220423a58f02e84c89120abb6 namespace=k8s.io Jul 2 01:54:12.633109 env[1467]: time="2024-07-02T01:54:12.633115593Z" level=info msg="cleaning up dead shim" Jul 2 01:54:12.641082 env[1467]: time="2024-07-02T01:54:12.641031527Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:54:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2423 runtime=io.containerd.runc.v2\n" Jul 2 01:54:12.731657 env[1467]: time="2024-07-02T01:54:12.731586772Z" level=error msg="Failed to destroy network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:12.733584 env[1467]: time="2024-07-02T01:54:12.733531996Z" level=error msg="encountered an error cleaning up failed sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:12.733759 env[1467]: time="2024-07-02T01:54:12.733733398Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ktr5,Uid:5f879095-b675-45e1-a885-f0c2f5daa680,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:12.734561 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68-shm.mount: Deactivated successfully. Jul 2 01:54:12.735830 kubelet[2028]: E0702 01:54:12.735784 2028 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:12.735895 kubelet[2028]: E0702 01:54:12.735862 2028 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6ktr5" Jul 2 01:54:12.735895 kubelet[2028]: E0702 01:54:12.735881 2028 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6ktr5" Jul 2 01:54:12.735951 kubelet[2028]: E0702 01:54:12.735933 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6ktr5_calico-system(5f879095-b675-45e1-a885-f0c2f5daa680)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6ktr5_calico-system(5f879095-b675-45e1-a885-f0c2f5daa680)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:54:13.004803 kubelet[2028]: E0702 01:54:13.004722 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:13.114451 kubelet[2028]: I0702 01:54:13.114417 2028 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:13.114669 env[1467]: time="2024-07-02T01:54:13.114635048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 01:54:13.115075 env[1467]: time="2024-07-02T01:54:13.115033573Z" level=info msg="StopPodSandbox for \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\"" Jul 2 01:54:13.141636 env[1467]: time="2024-07-02T01:54:13.141586323Z" level=error msg="StopPodSandbox for \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\" failed" error="failed to destroy network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:13.142066 kubelet[2028]: E0702 01:54:13.142015 2028 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:13.142149 kubelet[2028]: E0702 01:54:13.142087 2028 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68"} Jul 2 01:54:13.142185 kubelet[2028]: E0702 01:54:13.142163 2028 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5f879095-b675-45e1-a885-f0c2f5daa680\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:54:13.142240 kubelet[2028]: E0702 01:54:13.142186 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5f879095-b675-45e1-a885-f0c2f5daa680\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6ktr5" podUID="5f879095-b675-45e1-a885-f0c2f5daa680" Jul 2 01:54:13.984610 kubelet[2028]: E0702 01:54:13.984568 2028 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:14.004846 kubelet[2028]: E0702 01:54:14.004804 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:14.294814 kubelet[2028]: I0702 01:54:14.294196 2028 topology_manager.go:215] "Topology Admit Handler" podUID="0d3fcb5b-52d3-4826-b4e8-6e64469a740b" podNamespace="default" podName="nginx-deployment-85f456d6dd-452km" Jul 2 01:54:14.298958 systemd[1]: Created slice kubepods-besteffort-pod0d3fcb5b_52d3_4826_b4e8_6e64469a740b.slice. Jul 2 01:54:14.417726 kubelet[2028]: I0702 01:54:14.417680 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-96m95\" (UniqueName: \"kubernetes.io/projected/0d3fcb5b-52d3-4826-b4e8-6e64469a740b-kube-api-access-96m95\") pod \"nginx-deployment-85f456d6dd-452km\" (UID: \"0d3fcb5b-52d3-4826-b4e8-6e64469a740b\") " pod="default/nginx-deployment-85f456d6dd-452km" Jul 2 01:54:14.602181 env[1467]: time="2024-07-02T01:54:14.602066286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-452km,Uid:0d3fcb5b-52d3-4826-b4e8-6e64469a740b,Namespace:default,Attempt:0,}" Jul 2 01:54:15.005974 kubelet[2028]: E0702 01:54:15.005865 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:15.671724 env[1467]: time="2024-07-02T01:54:15.671666039Z" level=error msg="Failed to destroy network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:15.673752 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a-shm.mount: Deactivated successfully. Jul 2 01:54:15.674284 env[1467]: time="2024-07-02T01:54:15.674238387Z" level=error msg="encountered an error cleaning up failed sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:15.674452 env[1467]: time="2024-07-02T01:54:15.674424749Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-452km,Uid:0d3fcb5b-52d3-4826-b4e8-6e64469a740b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:15.675162 kubelet[2028]: E0702 01:54:15.674759 2028 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:15.675162 kubelet[2028]: E0702 01:54:15.674820 2028 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-452km" Jul 2 01:54:15.675162 kubelet[2028]: E0702 01:54:15.674840 2028 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-452km" Jul 2 01:54:15.675309 kubelet[2028]: E0702 01:54:15.675114 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-452km_default(0d3fcb5b-52d3-4826-b4e8-6e64469a740b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-452km_default(0d3fcb5b-52d3-4826-b4e8-6e64469a740b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-452km" podUID="0d3fcb5b-52d3-4826-b4e8-6e64469a740b" Jul 2 01:54:16.006692 kubelet[2028]: E0702 01:54:16.006545 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:16.120913 kubelet[2028]: I0702 01:54:16.120261 2028 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:16.121224 env[1467]: time="2024-07-02T01:54:16.121167118Z" level=info msg="StopPodSandbox for \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\"" Jul 2 01:54:16.159283 env[1467]: time="2024-07-02T01:54:16.159232490Z" level=error msg="StopPodSandbox for \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\" failed" error="failed to destroy network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:54:16.159801 kubelet[2028]: E0702 01:54:16.159655 2028 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:16.159801 kubelet[2028]: E0702 01:54:16.159711 2028 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a"} Jul 2 01:54:16.159801 kubelet[2028]: E0702 01:54:16.159743 2028 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0d3fcb5b-52d3-4826-b4e8-6e64469a740b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:54:16.159801 kubelet[2028]: E0702 01:54:16.159763 2028 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0d3fcb5b-52d3-4826-b4e8-6e64469a740b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-452km" podUID="0d3fcb5b-52d3-4826-b4e8-6e64469a740b" Jul 2 01:54:17.007546 kubelet[2028]: E0702 01:54:17.007491 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:18.008574 kubelet[2028]: E0702 01:54:18.008492 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:18.138736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3549146002.mount: Deactivated successfully. Jul 2 01:54:19.008904 kubelet[2028]: E0702 01:54:19.008857 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:19.386888 env[1467]: time="2024-07-02T01:54:19.386817847Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:19.395815 env[1467]: time="2024-07-02T01:54:19.395767177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:19.399841 env[1467]: time="2024-07-02T01:54:19.399801858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:19.404620 env[1467]: time="2024-07-02T01:54:19.404583386Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:19.404914 env[1467]: time="2024-07-02T01:54:19.404884829Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 01:54:19.423366 env[1467]: time="2024-07-02T01:54:19.423304174Z" level=info msg="CreateContainer within sandbox \"5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 01:54:19.449923 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2194856768.mount: Deactivated successfully. Jul 2 01:54:19.467033 env[1467]: time="2024-07-02T01:54:19.466904373Z" level=info msg="CreateContainer within sandbox \"5e9c7c646daceddcef1a5780bc5da80bcf6a7df45322dc0383d09fdc9fb7f7f7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"90efa87dbca555e63a6bfec43a1e6e05ec3263bb2e7e5a14adadfaf1e703eca3\"" Jul 2 01:54:19.467873 env[1467]: time="2024-07-02T01:54:19.467836222Z" level=info msg="StartContainer for \"90efa87dbca555e63a6bfec43a1e6e05ec3263bb2e7e5a14adadfaf1e703eca3\"" Jul 2 01:54:19.486957 systemd[1]: Started cri-containerd-90efa87dbca555e63a6bfec43a1e6e05ec3263bb2e7e5a14adadfaf1e703eca3.scope. Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.508609 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 01:54:19.508730 kernel: audit: type=1400 audit(1719885259.502:532): avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2105 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:19.550104 kernel: audit: type=1300 audit(1719885259.502:532): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2105 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:19.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656661383764626361353535653633613662666563343361316536 Jul 2 01:54:19.574319 kernel: audit: type=1327 audit(1719885259.502:532): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656661383764626361353535653633613662666563343361316536 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.591736 kernel: audit: type=1400 audit(1719885259.502:533): avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.608714 kernel: audit: type=1400 audit(1719885259.502:533): avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.613000 kernel: audit: type=1400 audit(1719885259.502:533): avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.619122 env[1467]: time="2024-07-02T01:54:19.619059264Z" level=info msg="StartContainer for \"90efa87dbca555e63a6bfec43a1e6e05ec3263bb2e7e5a14adadfaf1e703eca3\" returns successfully" Jul 2 01:54:19.626466 kernel: audit: type=1400 audit(1719885259.502:533): avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.660697 kernel: audit: type=1400 audit(1719885259.502:533): avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.678999 kernel: audit: type=1400 audit(1719885259.502:533): avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.679079 kernel: audit: type=1400 audit(1719885259.502:533): avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit: BPF prog-id=73 op=LOAD Jul 2 01:54:19.502000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2105 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:19.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656661383764626361353535653633613662666563343361316536 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.502000 audit: BPF prog-id=74 op=LOAD Jul 2 01:54:19.502000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2105 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:19.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656661383764626361353535653633613662666563343361316536 Jul 2 01:54:19.503000 audit: BPF prog-id=74 op=UNLOAD Jul 2 01:54:19.503000 audit: BPF prog-id=73 op=UNLOAD Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:19.503000 audit: BPF prog-id=75 op=LOAD Jul 2 01:54:19.503000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2105 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:19.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656661383764626361353535653633613662666563343361316536 Jul 2 01:54:19.824828 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 01:54:19.824999 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 01:54:20.010106 kubelet[2028]: E0702 01:54:20.009991 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:20.712250 systemd[1]: run-containerd-runc-k8s.io-90efa87dbca555e63a6bfec43a1e6e05ec3263bb2e7e5a14adadfaf1e703eca3-runc.HR4hjW.mount: Deactivated successfully. Jul 2 01:54:21.010860 kubelet[2028]: E0702 01:54:21.010537 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:21.062000 audit[2696]: AVC avc: denied { write } for pid=2696 comm="tee" name="fd" dev="proc" ino=18264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:21.062000 audit[2696]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5889a14 a2=241 a3=1b6 items=1 ppid=2662 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.062000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 01:54:21.062000 audit: PATH item=0 name="/dev/fd/63" inode=18253 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:21.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:21.088000 audit[2722]: AVC avc: denied { write } for pid=2722 comm="tee" name="fd" dev="proc" ino=18636 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:21.097000 audit[2720]: AVC avc: denied { write } for pid=2720 comm="tee" name="fd" dev="proc" ino=18279 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:21.097000 audit[2720]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8a57a16 a2=241 a3=1b6 items=1 ppid=2684 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.097000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 01:54:21.097000 audit: PATH item=0 name="/dev/fd/63" inode=18627 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:21.097000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:21.099000 audit[2725]: AVC avc: denied { write } for pid=2725 comm="tee" name="fd" dev="proc" ino=18639 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:21.088000 audit[2722]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2c70a05 a2=241 a3=1b6 items=1 ppid=2683 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.088000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 01:54:21.088000 audit: PATH item=0 name="/dev/fd/63" inode=18270 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:21.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:21.099000 audit[2725]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5f16a04 a2=241 a3=1b6 items=1 ppid=2680 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.099000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 01:54:21.099000 audit: PATH item=0 name="/dev/fd/63" inode=18630 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:21.099000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:21.103000 audit[2730]: AVC avc: denied { write } for pid=2730 comm="tee" name="fd" dev="proc" ino=18283 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:21.103000 audit[2730]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe066ea15 a2=241 a3=1b6 items=1 ppid=2679 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.103000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 01:54:21.103000 audit: PATH item=0 name="/dev/fd/63" inode=18273 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:21.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:21.104000 audit[2732]: AVC avc: denied { write } for pid=2732 comm="tee" name="fd" dev="proc" ino=18644 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:21.104000 audit[2727]: AVC avc: denied { write } for pid=2727 comm="tee" name="fd" dev="proc" ino=18287 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:54:21.104000 audit[2727]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd4607a14 a2=241 a3=1b6 items=1 ppid=2676 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.104000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 01:54:21.104000 audit: PATH item=0 name="/dev/fd/63" inode=18633 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:21.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:21.104000 audit[2732]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9923a14 a2=241 a3=1b6 items=1 ppid=2677 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.104000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 01:54:21.104000 audit: PATH item=0 name="/dev/fd/63" inode=18276 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:54:21.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:54:21.284450 kernel: Initializing XFRM netlink socket Jul 2 01:54:21.422114 systemd-networkd[1631]: vxlan.calico: Link UP Jul 2 01:54:21.422122 systemd-networkd[1631]: vxlan.calico: Gained carrier Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit: BPF prog-id=76 op=LOAD Jul 2 01:54:21.424000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdb2a9b18 a2=70 a3=ffffdb2a9b88 items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.424000 audit: BPF prog-id=76 op=UNLOAD Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit: BPF prog-id=77 op=LOAD Jul 2 01:54:21.424000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdb2a9b18 a2=70 a3=4b243c items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.424000 audit: BPF prog-id=77 op=UNLOAD Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdb2a9ad0 a2=70 a3=ffffdb2a9b40 items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit: BPF prog-id=78 op=LOAD Jul 2 01:54:21.424000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdb2a9ab8 a2=70 a3=ffffdb2a9b28 items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.424000 audit: BPF prog-id=78 op=UNLOAD Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdb2a9b88 a2=70 a3=0 items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdb2a9b78 a2=70 a3=0 items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.424000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.424000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdb2a9ae8 a2=70 a3=0 items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdb2a9bc0 a2=70 a3=9a7e48f items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdb2a9bc0 a2=70 a3=9a7e48f items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { perfmon } for pid=2823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit[2823]: AVC avc: denied { bpf } for pid=2823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.425000 audit: BPF prog-id=79 op=LOAD Jul 2 01:54:21.425000 audit[2823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb2a9ae8 a2=70 a3=9a7e4a9 items=0 ppid=2663 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.425000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:54:21.428000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.428000 audit[2829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff2543928 a2=70 a3=fffff2543998 items=0 ppid=2663 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:54:21.428000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:21.428000 audit[2829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff25437f8 a2=70 a3=fffff2543868 items=0 ppid=2663 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:54:21.437000 audit: BPF prog-id=79 op=UNLOAD Jul 2 01:54:21.656000 audit[2855]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:21.656000 audit[2855]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff3a43270 a2=0 a3=ffff9accafa8 items=0 ppid=2663 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.656000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:21.677000 audit[2854]: NETFILTER_CFG table=raw:72 family=2 entries=19 op=nft_register_chain pid=2854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:21.677000 audit[2854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffd6726900 a2=0 a3=ffffb9456fa8 items=0 ppid=2663 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.677000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:21.690000 audit[2852]: NETFILTER_CFG table=nat:73 family=2 entries=15 op=nft_register_chain pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:21.690000 audit[2852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffca92ed10 a2=0 a3=ffff9b3f8fa8 items=0 ppid=2663 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.690000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:21.691000 audit[2853]: NETFILTER_CFG table=filter:74 family=2 entries=39 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:21.691000 audit[2853]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe8ff7e10 a2=0 a3=ffffa1010fa8 items=0 ppid=2663 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:21.691000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:22.011070 kubelet[2028]: E0702 01:54:22.010955 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:22.629528 systemd-networkd[1631]: vxlan.calico: Gained IPv6LL Jul 2 01:54:23.011971 kubelet[2028]: E0702 01:54:23.011849 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:24.012405 kubelet[2028]: E0702 01:54:24.012364 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:25.012984 kubelet[2028]: E0702 01:54:25.012939 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:25.076107 env[1467]: time="2024-07-02T01:54:25.076062801Z" level=info msg="StopPodSandbox for \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\"" Jul 2 01:54:25.120130 kubelet[2028]: I0702 01:54:25.119917 2028 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-g49zv" podStartSLOduration=11.729680259 podStartE2EDuration="31.119898223s" podCreationTimestamp="2024-07-02 01:53:54 +0000 UTC" firstStartedPulling="2024-07-02 01:54:00.019756196 +0000 UTC m=+7.133721011" lastFinishedPulling="2024-07-02 01:54:19.40997416 +0000 UTC m=+26.523938975" observedRunningTime="2024-07-02 01:54:20.139457426 +0000 UTC m=+27.253422241" watchObservedRunningTime="2024-07-02 01:54:25.119898223 +0000 UTC m=+32.233863038" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.119 [INFO][2881] k8s.go 608: Cleaning up netns ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.119 [INFO][2881] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" iface="eth0" netns="/var/run/netns/cni-34aec7f2-17d6-36df-15c5-15661f851bf5" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.119 [INFO][2881] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" iface="eth0" netns="/var/run/netns/cni-34aec7f2-17d6-36df-15c5-15661f851bf5" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.119 [INFO][2881] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" iface="eth0" netns="/var/run/netns/cni-34aec7f2-17d6-36df-15c5-15661f851bf5" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.119 [INFO][2881] k8s.go 615: Releasing IP address(es) ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.119 [INFO][2881] utils.go 188: Calico CNI releasing IP address ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.139 [INFO][2888] ipam_plugin.go 411: Releasing address using handleID ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.139 [INFO][2888] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.139 [INFO][2888] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.147 [WARNING][2888] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.147 [INFO][2888] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.149 [INFO][2888] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:25.151483 env[1467]: 2024-07-02 01:54:25.150 [INFO][2881] k8s.go 621: Teardown processing complete. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:25.154631 systemd[1]: run-netns-cni\x2d34aec7f2\x2d17d6\x2d36df\x2d15c5\x2d15661f851bf5.mount: Deactivated successfully. Jul 2 01:54:25.155556 env[1467]: time="2024-07-02T01:54:25.155514534Z" level=info msg="TearDown network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\" successfully" Jul 2 01:54:25.155654 env[1467]: time="2024-07-02T01:54:25.155637215Z" level=info msg="StopPodSandbox for \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\" returns successfully" Jul 2 01:54:25.156456 env[1467]: time="2024-07-02T01:54:25.156424902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ktr5,Uid:5f879095-b675-45e1-a885-f0c2f5daa680,Namespace:calico-system,Attempt:1,}" Jul 2 01:54:26.014398 kubelet[2028]: E0702 01:54:26.014341 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:26.142995 systemd-networkd[1631]: cali32a589884de: Link UP Jul 2 01:54:26.155166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:54:26.155321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32a589884de: link becomes ready Jul 2 01:54:26.155621 systemd-networkd[1631]: cali32a589884de: Gained carrier Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.081 [INFO][2895] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-csi--node--driver--6ktr5-eth0 csi-node-driver- calico-system 5f879095-b675-45e1-a885-f0c2f5daa680 1299 0 2024-07-02 01:53:54 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.48 csi-node-driver-6ktr5 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali32a589884de [] []}} ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.081 [INFO][2895] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.106 [INFO][2906] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" HandleID="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.118 [INFO][2906] ipam_plugin.go 264: Auto assigning IP ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" HandleID="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002edba0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.48", "pod":"csi-node-driver-6ktr5", "timestamp":"2024-07-02 01:54:26.106490568 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.118 [INFO][2906] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.118 [INFO][2906] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.118 [INFO][2906] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.120 [INFO][2906] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.123 [INFO][2906] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.126 [INFO][2906] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.128 [INFO][2906] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.130 [INFO][2906] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.130 [INFO][2906] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.131 [INFO][2906] ipam.go 1685: Creating new handle: k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.134 [INFO][2906] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.139 [INFO][2906] ipam.go 1216: Successfully claimed IPs: [192.168.41.1/26] block=192.168.41.0/26 handle="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.139 [INFO][2906] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.1/26] handle="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" host="10.200.20.48" Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.139 [INFO][2906] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:26.172452 env[1467]: 2024-07-02 01:54:26.139 [INFO][2906] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.41.1/26] IPv6=[] ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" HandleID="k8s-pod-network.a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:26.173192 env[1467]: 2024-07-02 01:54:26.141 [INFO][2895] k8s.go 386: Populated endpoint ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--6ktr5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5f879095-b675-45e1-a885-f0c2f5daa680", ResourceVersion:"1299", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 53, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"csi-node-driver-6ktr5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali32a589884de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:26.173192 env[1467]: 2024-07-02 01:54:26.141 [INFO][2895] k8s.go 387: Calico CNI using IPs: [192.168.41.1/32] ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:26.173192 env[1467]: 2024-07-02 01:54:26.141 [INFO][2895] dataplane_linux.go 68: Setting the host side veth name to cali32a589884de ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:26.173192 env[1467]: 2024-07-02 01:54:26.157 [INFO][2895] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:26.173192 env[1467]: 2024-07-02 01:54:26.158 [INFO][2895] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--6ktr5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5f879095-b675-45e1-a885-f0c2f5daa680", ResourceVersion:"1299", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 53, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf", Pod:"csi-node-driver-6ktr5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali32a589884de", MAC:"f2:0e:f4:48:af:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:26.173192 env[1467]: 2024-07-02 01:54:26.166 [INFO][2895] k8s.go 500: Wrote updated endpoint to datastore ContainerID="a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf" Namespace="calico-system" Pod="csi-node-driver-6ktr5" WorkloadEndpoint="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:26.179000 audit[2927]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:26.185328 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 01:54:26.185425 kernel: audit: type=1325 audit(1719885266.179:565): table=filter:75 family=2 entries=34 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:26.179000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd0ba84b0 a2=0 a3=ffffb5644fa8 items=0 ppid=2663 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.225844 kernel: audit: type=1300 audit(1719885266.179:565): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd0ba84b0 a2=0 a3=ffffb5644fa8 items=0 ppid=2663 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.179000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:26.241632 kernel: audit: type=1327 audit(1719885266.179:565): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:26.241888 env[1467]: time="2024-07-02T01:54:26.233089007Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:54:26.241888 env[1467]: time="2024-07-02T01:54:26.233129528Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:54:26.241888 env[1467]: time="2024-07-02T01:54:26.233139528Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:54:26.241888 env[1467]: time="2024-07-02T01:54:26.233276289Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf pid=2936 runtime=io.containerd.runc.v2 Jul 2 01:54:26.262980 systemd[1]: run-containerd-runc-k8s.io-a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf-runc.GZ6ueN.mount: Deactivated successfully. Jul 2 01:54:26.264593 systemd[1]: Started cri-containerd-a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf.scope. Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.311182 kernel: audit: type=1400 audit(1719885266.276:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.311272 kernel: audit: type=1400 audit(1719885266.276:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.311302 kernel: audit: type=1400 audit(1719885266.276:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.344571 kernel: audit: type=1400 audit(1719885266.276:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.362094 kernel: audit: type=1400 audit(1719885266.276:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.379368 kernel: audit: type=1400 audit(1719885266.276:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.396744 kernel: audit: type=1400 audit(1719885266.276:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit: BPF prog-id=80 op=LOAD Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343237356538393635386238613933666134623936356637336236 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343237356538393635386238613933666134623936356637336236 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.276000 audit: BPF prog-id=81 op=LOAD Jul 2 01:54:26.276000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343237356538393635386238613933666134623936356637336236 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.293000 audit: BPF prog-id=82 op=LOAD Jul 2 01:54:26.293000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343237356538393635386238613933666134623936356637336236 Jul 2 01:54:26.310000 audit: BPF prog-id=82 op=UNLOAD Jul 2 01:54:26.310000 audit: BPF prog-id=81 op=UNLOAD Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:26.310000 audit: BPF prog-id=83 op=LOAD Jul 2 01:54:26.310000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343237356538393635386238613933666134623936356637336236 Jul 2 01:54:26.405778 env[1467]: time="2024-07-02T01:54:26.405729359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ktr5,Uid:5f879095-b675-45e1-a885-f0c2f5daa680,Namespace:calico-system,Attempt:1,} returns sandbox id \"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf\"" Jul 2 01:54:26.407405 env[1467]: time="2024-07-02T01:54:26.407205971Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 01:54:27.015723 kubelet[2028]: E0702 01:54:27.015671 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:27.493535 systemd-networkd[1631]: cali32a589884de: Gained IPv6LL Jul 2 01:54:27.527103 env[1467]: time="2024-07-02T01:54:27.527059815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.535469 env[1467]: time="2024-07-02T01:54:27.535432005Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.538604 env[1467]: time="2024-07-02T01:54:27.538568951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.546813 env[1467]: time="2024-07-02T01:54:27.546775980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:27.547238 env[1467]: time="2024-07-02T01:54:27.547212503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 01:54:27.549845 env[1467]: time="2024-07-02T01:54:27.549798285Z" level=info msg="CreateContainer within sandbox \"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 01:54:27.577730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1248907609.mount: Deactivated successfully. Jul 2 01:54:27.594960 env[1467]: time="2024-07-02T01:54:27.594894540Z" level=info msg="CreateContainer within sandbox \"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"39f6bdcafe6c7592bdc9ea889de61483e325d30d6d2321712dcd98c7bd31deb1\"" Jul 2 01:54:27.596318 env[1467]: time="2024-07-02T01:54:27.596275752Z" level=info msg="StartContainer for \"39f6bdcafe6c7592bdc9ea889de61483e325d30d6d2321712dcd98c7bd31deb1\"" Jul 2 01:54:27.622399 systemd[1]: Started cri-containerd-39f6bdcafe6c7592bdc9ea889de61483e325d30d6d2321712dcd98c7bd31deb1.scope. Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2936 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663662646361666536633735393262646339656138383964653631 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.635000 audit: BPF prog-id=84 op=LOAD Jul 2 01:54:27.635000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2936 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663662646361666536633735393262646339656138383964653631 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.636000 audit: BPF prog-id=85 op=LOAD Jul 2 01:54:27.636000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2936 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663662646361666536633735393262646339656138383964653631 Jul 2 01:54:27.637000 audit: BPF prog-id=85 op=UNLOAD Jul 2 01:54:27.637000 audit: BPF prog-id=84 op=UNLOAD Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:27.637000 audit: BPF prog-id=86 op=LOAD Jul 2 01:54:27.637000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2936 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663662646361666536633735393262646339656138383964653631 Jul 2 01:54:27.656740 env[1467]: time="2024-07-02T01:54:27.656691695Z" level=info msg="StartContainer for \"39f6bdcafe6c7592bdc9ea889de61483e325d30d6d2321712dcd98c7bd31deb1\" returns successfully" Jul 2 01:54:27.658202 env[1467]: time="2024-07-02T01:54:27.658155227Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 01:54:28.015961 kubelet[2028]: E0702 01:54:28.015921 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:28.854397 env[1467]: time="2024-07-02T01:54:28.854303873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:28.864516 env[1467]: time="2024-07-02T01:54:28.864475075Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:28.869193 env[1467]: time="2024-07-02T01:54:28.869117673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:28.874449 env[1467]: time="2024-07-02T01:54:28.874386316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:28.875245 env[1467]: time="2024-07-02T01:54:28.875216643Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 01:54:28.879053 env[1467]: time="2024-07-02T01:54:28.879013754Z" level=info msg="CreateContainer within sandbox \"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 01:54:28.909346 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount813030838.mount: Deactivated successfully. Jul 2 01:54:28.927593 env[1467]: time="2024-07-02T01:54:28.927539349Z" level=info msg="CreateContainer within sandbox \"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3f0bb9ec24c7911f35b58de29092837ed3489b0a71cc07b61ca9c5024bfa6f89\"" Jul 2 01:54:28.928820 env[1467]: time="2024-07-02T01:54:28.928783679Z" level=info msg="StartContainer for \"3f0bb9ec24c7911f35b58de29092837ed3489b0a71cc07b61ca9c5024bfa6f89\"" Jul 2 01:54:28.954428 systemd[1]: Started cri-containerd-3f0bb9ec24c7911f35b58de29092837ed3489b0a71cc07b61ca9c5024bfa6f89.scope. Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2936 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:28.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366306262396563323463373931316633356235386465323930393238 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.975000 audit: BPF prog-id=87 op=LOAD Jul 2 01:54:28.975000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2936 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:28.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366306262396563323463373931316633356235386465323930393238 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.976000 audit: BPF prog-id=88 op=LOAD Jul 2 01:54:28.976000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2936 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:28.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366306262396563323463373931316633356235386465323930393238 Jul 2 01:54:28.976000 audit: BPF prog-id=88 op=UNLOAD Jul 2 01:54:28.977000 audit: BPF prog-id=87 op=UNLOAD Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:28.977000 audit: BPF prog-id=89 op=LOAD Jul 2 01:54:28.977000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2936 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:28.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366306262396563323463373931316633356235386465323930393238 Jul 2 01:54:28.996185 env[1467]: time="2024-07-02T01:54:28.996132428Z" level=info msg="StartContainer for \"3f0bb9ec24c7911f35b58de29092837ed3489b0a71cc07b61ca9c5024bfa6f89\" returns successfully" Jul 2 01:54:29.016693 kubelet[2028]: E0702 01:54:29.016644 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:29.075560 env[1467]: time="2024-07-02T01:54:29.075410140Z" level=info msg="StopPodSandbox for \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\"" Jul 2 01:54:29.091184 kubelet[2028]: I0702 01:54:29.089814 2028 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 01:54:29.091184 kubelet[2028]: I0702 01:54:29.089855 2028 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 01:54:29.158611 kubelet[2028]: I0702 01:54:29.156806 2028 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6ktr5" podStartSLOduration=32.686815179999996 podStartE2EDuration="35.156788508s" podCreationTimestamp="2024-07-02 01:53:54 +0000 UTC" firstStartedPulling="2024-07-02 01:54:26.406983249 +0000 UTC m=+33.520948064" lastFinishedPulling="2024-07-02 01:54:28.876956577 +0000 UTC m=+35.990921392" observedRunningTime="2024-07-02 01:54:29.156761747 +0000 UTC m=+36.270726562" watchObservedRunningTime="2024-07-02 01:54:29.156788508 +0000 UTC m=+36.270753323" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.122 [INFO][3060] k8s.go 608: Cleaning up netns ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.123 [INFO][3060] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" iface="eth0" netns="/var/run/netns/cni-58ecb8d3-c46e-d7fc-d15c-07148ed7b443" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.123 [INFO][3060] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" iface="eth0" netns="/var/run/netns/cni-58ecb8d3-c46e-d7fc-d15c-07148ed7b443" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.123 [INFO][3060] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" iface="eth0" netns="/var/run/netns/cni-58ecb8d3-c46e-d7fc-d15c-07148ed7b443" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.123 [INFO][3060] k8s.go 615: Releasing IP address(es) ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.123 [INFO][3060] utils.go 188: Calico CNI releasing IP address ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.144 [INFO][3066] ipam_plugin.go 411: Releasing address using handleID ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.145 [INFO][3066] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.145 [INFO][3066] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.155 [WARNING][3066] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.156 [INFO][3066] ipam_plugin.go 439: Releasing address using workloadID ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.160 [INFO][3066] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:29.162824 env[1467]: 2024-07-02 01:54:29.161 [INFO][3060] k8s.go 621: Teardown processing complete. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:29.165214 systemd[1]: run-netns-cni\x2d58ecb8d3\x2dc46e\x2dd7fc\x2dd15c\x2d07148ed7b443.mount: Deactivated successfully. Jul 2 01:54:29.166121 env[1467]: time="2024-07-02T01:54:29.166086262Z" level=info msg="TearDown network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\" successfully" Jul 2 01:54:29.166241 env[1467]: time="2024-07-02T01:54:29.166221863Z" level=info msg="StopPodSandbox for \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\" returns successfully" Jul 2 01:54:29.167075 env[1467]: time="2024-07-02T01:54:29.167043069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-452km,Uid:0d3fcb5b-52d3-4826-b4e8-6e64469a740b,Namespace:default,Attempt:1,}" Jul 2 01:54:29.321095 systemd-networkd[1631]: cali60462b6967e: Link UP Jul 2 01:54:29.333859 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:54:29.333985 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60462b6967e: link becomes ready Jul 2 01:54:29.334527 systemd-networkd[1631]: cali60462b6967e: Gained carrier Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.254 [INFO][3074] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0 nginx-deployment-85f456d6dd- default 0d3fcb5b-52d3-4826-b4e8-6e64469a740b 1323 0 2024-07-02 01:54:14 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.48 nginx-deployment-85f456d6dd-452km eth0 default [] [] [kns.default ksa.default.default] cali60462b6967e [] []}} ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.254 [INFO][3074] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.279 [INFO][3086] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" HandleID="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.292 [INFO][3086] ipam_plugin.go 264: Auto assigning IP ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" HandleID="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002edd20), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.48", "pod":"nginx-deployment-85f456d6dd-452km", "timestamp":"2024-07-02 01:54:29.279292243 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.292 [INFO][3086] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.292 [INFO][3086] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.292 [INFO][3086] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.295 [INFO][3086] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.298 [INFO][3086] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.301 [INFO][3086] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.302 [INFO][3086] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.304 [INFO][3086] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.304 [INFO][3086] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.305 [INFO][3086] ipam.go 1685: Creating new handle: k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.310 [INFO][3086] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.315 [INFO][3086] ipam.go 1216: Successfully claimed IPs: [192.168.41.2/26] block=192.168.41.0/26 handle="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.315 [INFO][3086] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.2/26] handle="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" host="10.200.20.48" Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.315 [INFO][3086] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:29.345794 env[1467]: 2024-07-02 01:54:29.315 [INFO][3086] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.41.2/26] IPv6=[] ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" HandleID="k8s-pod-network.bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.346348 env[1467]: 2024-07-02 01:54:29.317 [INFO][3074] k8s.go 386: Populated endpoint ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"0d3fcb5b-52d3-4826-b4e8-6e64469a740b", ResourceVersion:"1323", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-452km", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali60462b6967e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:29.346348 env[1467]: 2024-07-02 01:54:29.317 [INFO][3074] k8s.go 387: Calico CNI using IPs: [192.168.41.2/32] ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.346348 env[1467]: 2024-07-02 01:54:29.317 [INFO][3074] dataplane_linux.go 68: Setting the host side veth name to cali60462b6967e ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.346348 env[1467]: 2024-07-02 01:54:29.335 [INFO][3074] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.346348 env[1467]: 2024-07-02 01:54:29.335 [INFO][3074] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"0d3fcb5b-52d3-4826-b4e8-6e64469a740b", ResourceVersion:"1323", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f", Pod:"nginx-deployment-85f456d6dd-452km", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali60462b6967e", MAC:"3e:82:b0:63:2b:67", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:29.346348 env[1467]: 2024-07-02 01:54:29.341 [INFO][3074] k8s.go 500: Wrote updated endpoint to datastore ContainerID="bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f" Namespace="default" Pod="nginx-deployment-85f456d6dd-452km" WorkloadEndpoint="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:29.354000 audit[3103]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:29.354000 audit[3103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffe62c22c0 a2=0 a3=ffffa3b4efa8 items=0 ppid=2663 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:29.367184 env[1467]: time="2024-07-02T01:54:29.367113702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:54:29.367596 env[1467]: time="2024-07-02T01:54:29.367156183Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:54:29.367596 env[1467]: time="2024-07-02T01:54:29.367167703Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:54:29.367596 env[1467]: time="2024-07-02T01:54:29.367335824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f pid=3115 runtime=io.containerd.runc.v2 Jul 2 01:54:29.378492 systemd[1]: Started cri-containerd-bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f.scope. Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.392000 audit: BPF prog-id=90 op=LOAD Jul 2 01:54:29.393000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.393000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326137356430323565343866313931373738366161383633353535 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326137356430323565343866313931373738366161383633353535 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit: BPF prog-id=91 op=LOAD Jul 2 01:54:29.394000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326137356430323565343866313931373738366161383633353535 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.394000 audit: BPF prog-id=92 op=LOAD Jul 2 01:54:29.394000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326137356430323565343866313931373738366161383633353535 Jul 2 01:54:29.395000 audit: BPF prog-id=92 op=UNLOAD Jul 2 01:54:29.395000 audit: BPF prog-id=91 op=UNLOAD Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:29.395000 audit: BPF prog-id=93 op=LOAD Jul 2 01:54:29.395000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326137356430323565343866313931373738366161383633353535 Jul 2 01:54:29.415399 env[1467]: time="2024-07-02T01:54:29.414594160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-452km,Uid:0d3fcb5b-52d3-4826-b4e8-6e64469a740b,Namespace:default,Attempt:1,} returns sandbox id \"bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f\"" Jul 2 01:54:29.419149 env[1467]: time="2024-07-02T01:54:29.419065636Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 01:54:30.017117 kubelet[2028]: E0702 01:54:30.017077 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:30.694080 systemd-networkd[1631]: cali60462b6967e: Gained IPv6LL Jul 2 01:54:31.017982 kubelet[2028]: E0702 01:54:31.017846 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:32.018701 kubelet[2028]: E0702 01:54:32.018661 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:32.337570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2892101394.mount: Deactivated successfully. Jul 2 01:54:33.018965 kubelet[2028]: E0702 01:54:33.018903 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:33.539919 env[1467]: time="2024-07-02T01:54:33.539869256Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:33.546553 env[1467]: time="2024-07-02T01:54:33.546507064Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:33.552126 env[1467]: time="2024-07-02T01:54:33.552079505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:33.556162 env[1467]: time="2024-07-02T01:54:33.556113294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:33.559026 env[1467]: time="2024-07-02T01:54:33.558974715Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653\"" Jul 2 01:54:33.562547 env[1467]: time="2024-07-02T01:54:33.562498421Z" level=info msg="CreateContainer within sandbox \"bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 01:54:33.593162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2368452196.mount: Deactivated successfully. Jul 2 01:54:33.598743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount347935202.mount: Deactivated successfully. Jul 2 01:54:33.613076 env[1467]: time="2024-07-02T01:54:33.613007589Z" level=info msg="CreateContainer within sandbox \"bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"94391894ac21a9b6bd76ba9aeef2676ef10b74615206635113af00a7ae776d3e\"" Jul 2 01:54:33.613852 env[1467]: time="2024-07-02T01:54:33.613822035Z" level=info msg="StartContainer for \"94391894ac21a9b6bd76ba9aeef2676ef10b74615206635113af00a7ae776d3e\"" Jul 2 01:54:33.630424 systemd[1]: Started cri-containerd-94391894ac21a9b6bd76ba9aeef2676ef10b74615206635113af00a7ae776d3e.scope. Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648568 kernel: kauditd_printk_skb: 196 callbacks suppressed Jul 2 01:54:33.648745 kernel: audit: type=1400 audit(1719885273.643:615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.680920 kernel: audit: type=1400 audit(1719885273.643:616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.681035 kernel: audit: type=1400 audit(1719885273.643:617): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.714464 kernel: audit: type=1400 audit(1719885273.643:618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.714764 kernel: audit: type=1400 audit(1719885273.643:619): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.747306 kernel: audit: type=1400 audit(1719885273.643:620): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.763951 kernel: audit: type=1400 audit(1719885273.643:621): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.780603 kernel: audit: type=1400 audit(1719885273.643:622): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.780725 kernel: audit: type=1400 audit(1719885273.643:623): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.813262 kernel: audit: type=1400 audit(1719885273.643:624): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit: BPF prog-id=94 op=LOAD Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3115 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:33.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333931383934616332316139623662643736626139616565663236 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3115 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:33.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333931383934616332316139623662643736626139616565663236 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.643000 audit: BPF prog-id=95 op=LOAD Jul 2 01:54:33.643000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3115 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:33.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333931383934616332316139623662643736626139616565663236 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.648000 audit: BPF prog-id=96 op=LOAD Jul 2 01:54:33.648000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3115 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:33.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333931383934616332316139623662643736626139616565663236 Jul 2 01:54:33.664000 audit: BPF prog-id=96 op=UNLOAD Jul 2 01:54:33.664000 audit: BPF prog-id=95 op=UNLOAD Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:33.664000 audit: BPF prog-id=97 op=LOAD Jul 2 01:54:33.664000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3115 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:33.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333931383934616332316139623662643736626139616565663236 Jul 2 01:54:33.816878 env[1467]: time="2024-07-02T01:54:33.816837555Z" level=info msg="StartContainer for \"94391894ac21a9b6bd76ba9aeef2676ef10b74615206635113af00a7ae776d3e\" returns successfully" Jul 2 01:54:33.983984 kubelet[2028]: E0702 01:54:33.983930 2028 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:34.019508 kubelet[2028]: E0702 01:54:34.019463 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:35.019794 kubelet[2028]: E0702 01:54:35.019756 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:36.020327 kubelet[2028]: E0702 01:54:36.020285 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:37.020587 kubelet[2028]: E0702 01:54:37.020544 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:38.021184 kubelet[2028]: E0702 01:54:38.021128 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:39.021488 kubelet[2028]: E0702 01:54:39.021423 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:40.021855 kubelet[2028]: E0702 01:54:40.021816 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:41.021983 kubelet[2028]: E0702 01:54:41.021946 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:42.022982 kubelet[2028]: E0702 01:54:42.022943 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:42.465000 audit[3230]: NETFILTER_CFG table=filter:77 family=2 entries=20 op=nft_register_rule pid=3230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.470682 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 01:54:42.470794 kernel: audit: type=1325 audit(1719885282.465:633): table=filter:77 family=2 entries=20 op=nft_register_rule pid=3230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.465000 audit[3230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff29e26d0 a2=0 a3=1 items=0 ppid=2235 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.484347 kubelet[2028]: I0702 01:54:42.484289 2028 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-452km" podStartSLOduration=24.342115658 podStartE2EDuration="28.484269274s" podCreationTimestamp="2024-07-02 01:54:14 +0000 UTC" firstStartedPulling="2024-07-02 01:54:29.418764193 +0000 UTC m=+36.532728968" lastFinishedPulling="2024-07-02 01:54:33.560917769 +0000 UTC m=+40.674882584" observedRunningTime="2024-07-02 01:54:34.165999037 +0000 UTC m=+41.279963812" watchObservedRunningTime="2024-07-02 01:54:42.484269274 +0000 UTC m=+49.598234089" Jul 2 01:54:42.485609 kubelet[2028]: I0702 01:54:42.485583 2028 topology_manager.go:215] "Topology Admit Handler" podUID="41e4643c-cd40-4c52-8cc7-ca11f909c3ac" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 01:54:42.509484 kernel: audit: type=1300 audit(1719885282.465:633): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff29e26d0 a2=0 a3=1 items=0 ppid=2235 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.522315 kernel: audit: type=1327 audit(1719885282.465:633): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.483000 audit[3230]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.536245 kernel: audit: type=1325 audit(1719885282.483:634): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.483000 audit[3230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff29e26d0 a2=0 a3=1 items=0 ppid=2235 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.561449 kernel: audit: type=1300 audit(1719885282.483:634): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff29e26d0 a2=0 a3=1 items=0 ppid=2235 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.574294 kernel: audit: type=1327 audit(1719885282.483:634): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.529000 audit[3234]: NETFILTER_CFG table=filter:79 family=2 entries=32 op=nft_register_rule pid=3234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.588505 kernel: audit: type=1325 audit(1719885282.529:635): table=filter:79 family=2 entries=32 op=nft_register_rule pid=3234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.529000 audit[3234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe8757750 a2=0 a3=1 items=0 ppid=2235 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.614389 kernel: audit: type=1300 audit(1719885282.529:635): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe8757750 a2=0 a3=1 items=0 ppid=2235 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.626851 kernel: audit: type=1327 audit(1719885282.529:635): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.529000 audit[3234]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=3234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.640653 kernel: audit: type=1325 audit(1719885282.529:636): table=nat:80 family=2 entries=22 op=nft_register_rule pid=3234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.529000 audit[3234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe8757750 a2=0 a3=1 items=0 ppid=2235 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.643005 systemd[1]: Created slice kubepods-besteffort-pod41e4643c_cd40_4c52_8cc7_ca11f909c3ac.slice. Jul 2 01:54:42.654301 kubelet[2028]: I0702 01:54:42.654260 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-27x2h\" (UniqueName: \"kubernetes.io/projected/41e4643c-cd40-4c52-8cc7-ca11f909c3ac-kube-api-access-27x2h\") pod \"nfs-server-provisioner-0\" (UID: \"41e4643c-cd40-4c52-8cc7-ca11f909c3ac\") " pod="default/nfs-server-provisioner-0" Jul 2 01:54:42.654438 kubelet[2028]: I0702 01:54:42.654304 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/41e4643c-cd40-4c52-8cc7-ca11f909c3ac-data\") pod \"nfs-server-provisioner-0\" (UID: \"41e4643c-cd40-4c52-8cc7-ca11f909c3ac\") " pod="default/nfs-server-provisioner-0" Jul 2 01:54:42.946722 env[1467]: time="2024-07-02T01:54:42.946676678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:41e4643c-cd40-4c52-8cc7-ca11f909c3ac,Namespace:default,Attempt:0,}" Jul 2 01:54:43.024013 kubelet[2028]: E0702 01:54:43.023958 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:43.133451 systemd-networkd[1631]: cali60e51b789ff: Link UP Jul 2 01:54:43.145875 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:54:43.145976 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 01:54:43.147594 systemd-networkd[1631]: cali60e51b789ff: Gained carrier Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.018 [INFO][3236] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 41e4643c-cd40-4c52-8cc7-ca11f909c3ac 1376 0 2024-07-02 01:54:42 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.48 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.018 [INFO][3236] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.045 [INFO][3248] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" HandleID="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Workload="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.059 [INFO][3248] ipam_plugin.go 264: Auto assigning IP ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" HandleID="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Workload="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002efd30), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.48", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 01:54:43.045433631 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.059 [INFO][3248] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.059 [INFO][3248] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.059 [INFO][3248] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.060 [INFO][3248] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.064 [INFO][3248] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.068 [INFO][3248] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.071 [INFO][3248] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.073 [INFO][3248] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.073 [INFO][3248] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.096 [INFO][3248] ipam.go 1685: Creating new handle: k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.118 [INFO][3248] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.128 [INFO][3248] ipam.go 1216: Successfully claimed IPs: [192.168.41.3/26] block=192.168.41.0/26 handle="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.128 [INFO][3248] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.3/26] handle="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" host="10.200.20.48" Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.128 [INFO][3248] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:43.170593 env[1467]: 2024-07-02 01:54:43.128 [INFO][3248] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.41.3/26] IPv6=[] ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" HandleID="k8s-pod-network.3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Workload="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:54:43.171572 env[1467]: 2024-07-02 01:54:43.130 [INFO][3236] k8s.go 386: Populated endpoint ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"41e4643c-cd40-4c52-8cc7-ca11f909c3ac", ResourceVersion:"1376", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.41.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:43.171572 env[1467]: 2024-07-02 01:54:43.130 [INFO][3236] k8s.go 387: Calico CNI using IPs: [192.168.41.3/32] ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:54:43.171572 env[1467]: 2024-07-02 01:54:43.130 [INFO][3236] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:54:43.171572 env[1467]: 2024-07-02 01:54:43.147 [INFO][3236] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:54:43.171748 env[1467]: 2024-07-02 01:54:43.148 [INFO][3236] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"41e4643c-cd40-4c52-8cc7-ca11f909c3ac", ResourceVersion:"1376", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.41.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ca:5a:59:58:fc:14", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:43.171748 env[1467]: 2024-07-02 01:54:43.169 [INFO][3236] k8s.go 500: Wrote updated endpoint to datastore ContainerID="3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.48-k8s-nfs--server--provisioner--0-eth0" Jul 2 01:54:43.194000 audit[3280]: NETFILTER_CFG table=filter:81 family=2 entries=44 op=nft_register_chain pid=3280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:54:43.195508 env[1467]: time="2024-07-02T01:54:43.193431311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:54:43.195508 env[1467]: time="2024-07-02T01:54:43.193472152Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:54:43.195508 env[1467]: time="2024-07-02T01:54:43.193482872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:54:43.195508 env[1467]: time="2024-07-02T01:54:43.193613752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d pid=3281 runtime=io.containerd.runc.v2 Jul 2 01:54:43.194000 audit[3280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22672 a0=3 a1=fffff7ba2780 a2=0 a3=ffff912fffa8 items=0 ppid=2663 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.194000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:54:43.209833 systemd[1]: Started cri-containerd-3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d.scope. Jul 2 01:54:43.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.226000 audit: BPF prog-id=98 op=LOAD Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3281 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353230616139343439633163343636616164353132626264353961 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3281 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353230616139343439633163343636616164353132626264353961 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit: BPF prog-id=99 op=LOAD Jul 2 01:54:43.227000 audit[3291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3281 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353230616139343439633163343636616164353132626264353961 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit: BPF prog-id=100 op=LOAD Jul 2 01:54:43.227000 audit[3291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3281 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353230616139343439633163343636616164353132626264353961 Jul 2 01:54:43.227000 audit: BPF prog-id=100 op=UNLOAD Jul 2 01:54:43.227000 audit: BPF prog-id=99 op=UNLOAD Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { perfmon } for pid=3291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit[3291]: AVC avc: denied { bpf } for pid=3291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:43.227000 audit: BPF prog-id=101 op=LOAD Jul 2 01:54:43.227000 audit[3291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3281 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353230616139343439633163343636616164353132626264353961 Jul 2 01:54:43.246197 env[1467]: time="2024-07-02T01:54:43.246149905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:41e4643c-cd40-4c52-8cc7-ca11f909c3ac,Namespace:default,Attempt:0,} returns sandbox id \"3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d\"" Jul 2 01:54:43.247878 env[1467]: time="2024-07-02T01:54:43.247712034Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 01:54:43.768655 systemd[1]: run-containerd-runc-k8s.io-3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d-runc.zUqmYg.mount: Deactivated successfully. Jul 2 01:54:44.024828 kubelet[2028]: E0702 01:54:44.024778 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:44.261575 systemd-networkd[1631]: cali60e51b789ff: Gained IPv6LL Jul 2 01:54:45.025589 kubelet[2028]: E0702 01:54:45.025551 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:46.026545 kubelet[2028]: E0702 01:54:46.026507 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:46.783418 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount225797851.mount: Deactivated successfully. Jul 2 01:54:47.027526 kubelet[2028]: E0702 01:54:47.027486 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:48.028275 kubelet[2028]: E0702 01:54:48.028207 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:49.029132 kubelet[2028]: E0702 01:54:49.029091 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:50.030012 kubelet[2028]: E0702 01:54:50.029966 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:50.135613 env[1467]: time="2024-07-02T01:54:50.135567816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:50.144516 env[1467]: time="2024-07-02T01:54:50.144476182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:50.149019 env[1467]: time="2024-07-02T01:54:50.148967806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:50.153596 env[1467]: time="2024-07-02T01:54:50.153545950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:54:50.154585 env[1467]: time="2024-07-02T01:54:50.154518115Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Jul 2 01:54:50.158810 env[1467]: time="2024-07-02T01:54:50.158775337Z" level=info msg="CreateContainer within sandbox \"3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 01:54:50.180620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3128108670.mount: Deactivated successfully. Jul 2 01:54:50.188519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1936828300.mount: Deactivated successfully. Jul 2 01:54:50.206719 env[1467]: time="2024-07-02T01:54:50.206665907Z" level=info msg="CreateContainer within sandbox \"3e520aa9449c1c466aad512bbd59a8d3e7c96e0c4c646fe0885ce81db8a5da4d\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8d6978142d596feec4dfe29f23347d7eeacef1c0a95025d0f77da9f9f617a398\"" Jul 2 01:54:50.207247 env[1467]: time="2024-07-02T01:54:50.207220550Z" level=info msg="StartContainer for \"8d6978142d596feec4dfe29f23347d7eeacef1c0a95025d0f77da9f9f617a398\"" Jul 2 01:54:50.225560 systemd[1]: Started cri-containerd-8d6978142d596feec4dfe29f23347d7eeacef1c0a95025d0f77da9f9f617a398.scope. Jul 2 01:54:50.245293 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 01:54:50.245429 kernel: audit: type=1400 audit(1719885290.239:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.280824 kernel: audit: type=1400 audit(1719885290.239:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.298135 kernel: audit: type=1400 audit(1719885290.239:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.337041 kernel: audit: type=1400 audit(1719885290.239:659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.337150 kernel: audit: type=1400 audit(1719885290.239:660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.337671 env[1467]: time="2024-07-02T01:54:50.337634312Z" level=info msg="StartContainer for \"8d6978142d596feec4dfe29f23347d7eeacef1c0a95025d0f77da9f9f617a398\" returns successfully" Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.355736 kernel: audit: type=1400 audit(1719885290.239:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.390892 kernel: audit: type=1400 audit(1719885290.239:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.390985 kernel: audit: type=1400 audit(1719885290.239:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.407619 kernel: audit: type=1400 audit(1719885290.239:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.425111 kernel: audit: type=1400 audit(1719885290.244:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.244000 audit: BPF prog-id=102 op=LOAD Jul 2 01:54:50.261000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.261000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3281 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:50.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864363937383134326435393666656563346466653239663233333437 Jul 2 01:54:50.261000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.261000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3281 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:50.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864363937383134326435393666656563346466653239663233333437 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit: BPF prog-id=103 op=LOAD Jul 2 01:54:50.262000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3281 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:50.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864363937383134326435393666656563346466653239663233333437 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit: BPF prog-id=104 op=LOAD Jul 2 01:54:50.262000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3281 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:50.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864363937383134326435393666656563346466653239663233333437 Jul 2 01:54:50.262000 audit: BPF prog-id=104 op=UNLOAD Jul 2 01:54:50.262000 audit: BPF prog-id=103 op=UNLOAD Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:54:50.262000 audit: BPF prog-id=105 op=LOAD Jul 2 01:54:50.262000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3281 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:50.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864363937383134326435393666656563346466653239663233333437 Jul 2 01:54:50.365000 audit[3355]: AVC avc: denied { search } for pid=3355 comm="rpcbind" name="crypto" dev="proc" ino=21515 scontext=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 01:54:50.365000 audit[3355]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa4b2f000 a2=0 a3=0 items=0 ppid=3338 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 key=(null) Jul 2 01:54:50.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 2 01:54:50.429000 audit[3360]: AVC avc: denied { search } for pid=3360 comm="dbus-daemon" name="crypto" dev="proc" ino=21515 scontext=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 01:54:50.429000 audit[3360]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb6caf000 a2=0 a3=0 items=0 ppid=3338 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 key=(null) Jul 2 01:54:50.429000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 01:54:50.431000 audit[3361]: AVC avc: denied { watch } for pid=3361 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537663 scontext=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c896,c996 tclass=dir permissive=0 Jul 2 01:54:50.431000 audit[3361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaadd9be710 a2=2c8 a3=aaaadd9b0a60 items=0 ppid=3338 pid=3361 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 key=(null) Jul 2 01:54:50.431000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 2 01:54:50.437000 audit[3362]: AVC avc: denied { read } for pid=3362 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21616 scontext=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 2 01:54:50.437000 audit[3362]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa711a570 a2=80000 a3=0 items=0 ppid=3338 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 key=(null) Jul 2 01:54:50.437000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 01:54:50.437000 audit[3362]: AVC avc: denied { search } for pid=3362 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21515 scontext=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 2 01:54:50.437000 audit[3362]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa64af000 a2=0 a3=0 items=0 ppid=3338 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c896,c996 key=(null) Jul 2 01:54:50.437000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 2 01:54:51.030562 kubelet[2028]: E0702 01:54:51.030513 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:51.203041 kubelet[2028]: I0702 01:54:51.202964 2028 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.293801127 podStartE2EDuration="9.202915859s" podCreationTimestamp="2024-07-02 01:54:42 +0000 UTC" firstStartedPulling="2024-07-02 01:54:43.247456033 +0000 UTC m=+50.361420848" lastFinishedPulling="2024-07-02 01:54:50.156570765 +0000 UTC m=+57.270535580" observedRunningTime="2024-07-02 01:54:51.202100375 +0000 UTC m=+58.316065190" watchObservedRunningTime="2024-07-02 01:54:51.202915859 +0000 UTC m=+58.316880674" Jul 2 01:54:51.214000 audit[3389]: NETFILTER_CFG table=filter:82 family=2 entries=20 op=nft_register_rule pid=3389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:51.214000 audit[3389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe7a9d660 a2=0 a3=1 items=0 ppid=2235 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:51.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:51.217000 audit[3389]: NETFILTER_CFG table=nat:83 family=2 entries=106 op=nft_register_chain pid=3389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:51.217000 audit[3389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe7a9d660 a2=0 a3=1 items=0 ppid=2235 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:51.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:52.030806 kubelet[2028]: E0702 01:54:52.030762 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:53.031451 kubelet[2028]: E0702 01:54:53.031410 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:53.984330 kubelet[2028]: E0702 01:54:53.984290 2028 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:54.006163 env[1467]: time="2024-07-02T01:54:54.006123565Z" level=info msg="StopPodSandbox for \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\"" Jul 2 01:54:54.034532 kubelet[2028]: E0702 01:54:54.034489 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.041 [WARNING][3410] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"0d3fcb5b-52d3-4826-b4e8-6e64469a740b", ResourceVersion:"1340", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f", Pod:"nginx-deployment-85f456d6dd-452km", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali60462b6967e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.042 [INFO][3410] k8s.go 608: Cleaning up netns ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.042 [INFO][3410] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" iface="eth0" netns="" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.042 [INFO][3410] k8s.go 615: Releasing IP address(es) ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.042 [INFO][3410] utils.go 188: Calico CNI releasing IP address ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.060 [INFO][3416] ipam_plugin.go 411: Releasing address using handleID ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.060 [INFO][3416] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.061 [INFO][3416] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.068 [WARNING][3416] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.069 [INFO][3416] ipam_plugin.go 439: Releasing address using workloadID ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.070 [INFO][3416] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:54.072546 env[1467]: 2024-07-02 01:54:54.071 [INFO][3410] k8s.go 621: Teardown processing complete. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.072994 env[1467]: time="2024-07-02T01:54:54.072586650Z" level=info msg="TearDown network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\" successfully" Jul 2 01:54:54.072994 env[1467]: time="2024-07-02T01:54:54.072620090Z" level=info msg="StopPodSandbox for \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\" returns successfully" Jul 2 01:54:54.076579 env[1467]: time="2024-07-02T01:54:54.076514509Z" level=info msg="RemovePodSandbox for \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\"" Jul 2 01:54:54.076995 env[1467]: time="2024-07-02T01:54:54.076958392Z" level=info msg="Forcibly stopping sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\"" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.118 [WARNING][3437] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"0d3fcb5b-52d3-4826-b4e8-6e64469a740b", ResourceVersion:"1340", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"bd2a75d025e48f1917786aa8635552e8800d1263e49a41e56e17125ebd72494f", Pod:"nginx-deployment-85f456d6dd-452km", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali60462b6967e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.119 [INFO][3437] k8s.go 608: Cleaning up netns ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.119 [INFO][3437] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" iface="eth0" netns="" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.119 [INFO][3437] k8s.go 615: Releasing IP address(es) ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.119 [INFO][3437] utils.go 188: Calico CNI releasing IP address ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.145 [INFO][3443] ipam_plugin.go 411: Releasing address using handleID ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.145 [INFO][3443] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.145 [INFO][3443] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.153 [WARNING][3443] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.153 [INFO][3443] ipam_plugin.go 439: Releasing address using workloadID ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" HandleID="k8s-pod-network.be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Workload="10.200.20.48-k8s-nginx--deployment--85f456d6dd--452km-eth0" Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.155 [INFO][3443] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:54.157429 env[1467]: 2024-07-02 01:54:54.156 [INFO][3437] k8s.go 621: Teardown processing complete. ContainerID="be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a" Jul 2 01:54:54.157979 env[1467]: time="2024-07-02T01:54:54.157928667Z" level=info msg="TearDown network for sandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\" successfully" Jul 2 01:54:54.167392 env[1467]: time="2024-07-02T01:54:54.167319153Z" level=info msg="RemovePodSandbox \"be8a98c674bf1f9a6132826c1302d78217779068e7fbc477cbf8cf384cb4559a\" returns successfully" Jul 2 01:54:54.170398 env[1467]: time="2024-07-02T01:54:54.168333798Z" level=info msg="StopPodSandbox for \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\"" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.217 [WARNING][3462] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--6ktr5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5f879095-b675-45e1-a885-f0c2f5daa680", ResourceVersion:"1324", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 53, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf", Pod:"csi-node-driver-6ktr5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali32a589884de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.218 [INFO][3462] k8s.go 608: Cleaning up netns ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.218 [INFO][3462] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" iface="eth0" netns="" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.218 [INFO][3462] k8s.go 615: Releasing IP address(es) ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.218 [INFO][3462] utils.go 188: Calico CNI releasing IP address ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.237 [INFO][3468] ipam_plugin.go 411: Releasing address using handleID ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.237 [INFO][3468] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.237 [INFO][3468] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.245 [WARNING][3468] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.245 [INFO][3468] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.247 [INFO][3468] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:54.249675 env[1467]: 2024-07-02 01:54:54.248 [INFO][3462] k8s.go 621: Teardown processing complete. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.249675 env[1467]: time="2024-07-02T01:54:54.249623795Z" level=info msg="TearDown network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\" successfully" Jul 2 01:54:54.251121 env[1467]: time="2024-07-02T01:54:54.249654155Z" level=info msg="StopPodSandbox for \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\" returns successfully" Jul 2 01:54:54.251747 env[1467]: time="2024-07-02T01:54:54.251701085Z" level=info msg="RemovePodSandbox for \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\"" Jul 2 01:54:54.251839 env[1467]: time="2024-07-02T01:54:54.251751245Z" level=info msg="Forcibly stopping sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\"" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.288 [WARNING][3487] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-csi--node--driver--6ktr5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5f879095-b675-45e1-a885-f0c2f5daa680", ResourceVersion:"1324", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 53, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"a44275e89658b8a93fa4b965f73b688a325cf588f2509cb5635d36c04b7150bf", Pod:"csi-node-driver-6ktr5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali32a589884de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.289 [INFO][3487] k8s.go 608: Cleaning up netns ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.289 [INFO][3487] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" iface="eth0" netns="" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.289 [INFO][3487] k8s.go 615: Releasing IP address(es) ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.289 [INFO][3487] utils.go 188: Calico CNI releasing IP address ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.307 [INFO][3493] ipam_plugin.go 411: Releasing address using handleID ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.307 [INFO][3493] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.307 [INFO][3493] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.318 [WARNING][3493] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.319 [INFO][3493] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" HandleID="k8s-pod-network.b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Workload="10.200.20.48-k8s-csi--node--driver--6ktr5-eth0" Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.320 [INFO][3493] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:54:54.322260 env[1467]: 2024-07-02 01:54:54.321 [INFO][3487] k8s.go 621: Teardown processing complete. ContainerID="b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68" Jul 2 01:54:54.322698 env[1467]: time="2024-07-02T01:54:54.322296590Z" level=info msg="TearDown network for sandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\" successfully" Jul 2 01:54:54.328997 env[1467]: time="2024-07-02T01:54:54.328953863Z" level=info msg="RemovePodSandbox \"b5cb4bc24dcc4cb5082270313c5cf1cd4cd294216e9533b3cd67c8a6eedefa68\" returns successfully" Jul 2 01:54:55.034962 kubelet[2028]: E0702 01:54:55.034929 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:56.036322 kubelet[2028]: E0702 01:54:56.036280 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:57.037065 kubelet[2028]: E0702 01:54:57.037018 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:58.038137 kubelet[2028]: E0702 01:54:58.038098 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:54:59.039056 kubelet[2028]: E0702 01:54:59.039021 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:00.040054 kubelet[2028]: E0702 01:55:00.040013 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:01.040482 kubelet[2028]: E0702 01:55:01.040448 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:02.040838 kubelet[2028]: E0702 01:55:02.040792 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:03.041044 kubelet[2028]: E0702 01:55:03.041006 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:04.041999 kubelet[2028]: E0702 01:55:04.041964 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:05.043201 kubelet[2028]: E0702 01:55:05.043169 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:06.043796 kubelet[2028]: E0702 01:55:06.043763 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:07.044890 kubelet[2028]: E0702 01:55:07.044853 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:08.045127 kubelet[2028]: E0702 01:55:08.045092 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:09.045938 kubelet[2028]: E0702 01:55:09.045899 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:10.046745 kubelet[2028]: E0702 01:55:10.046701 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:11.047915 kubelet[2028]: E0702 01:55:11.047882 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:12.048574 kubelet[2028]: E0702 01:55:12.048533 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:13.048941 kubelet[2028]: E0702 01:55:13.048910 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:13.984062 kubelet[2028]: E0702 01:55:13.984026 2028 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:14.049513 kubelet[2028]: E0702 01:55:14.049490 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:14.658604 kubelet[2028]: I0702 01:55:14.658562 2028 topology_manager.go:215] "Topology Admit Handler" podUID="d35dd9ee-f514-4648-9f00-3b6b85b6d267" podNamespace="default" podName="test-pod-1" Jul 2 01:55:14.665059 systemd[1]: Created slice kubepods-besteffort-podd35dd9ee_f514_4648_9f00_3b6b85b6d267.slice. Jul 2 01:55:14.726309 kubelet[2028]: I0702 01:55:14.726266 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-1a85439d-d857-4928-80f1-b6d736d211fe\" (UniqueName: \"kubernetes.io/nfs/d35dd9ee-f514-4648-9f00-3b6b85b6d267-pvc-1a85439d-d857-4928-80f1-b6d736d211fe\") pod \"test-pod-1\" (UID: \"d35dd9ee-f514-4648-9f00-3b6b85b6d267\") " pod="default/test-pod-1" Jul 2 01:55:14.726309 kubelet[2028]: I0702 01:55:14.726308 2028 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zlmbd\" (UniqueName: \"kubernetes.io/projected/d35dd9ee-f514-4648-9f00-3b6b85b6d267-kube-api-access-zlmbd\") pod \"test-pod-1\" (UID: \"d35dd9ee-f514-4648-9f00-3b6b85b6d267\") " pod="default/test-pod-1" Jul 2 01:55:14.911167 kernel: Failed to create system directory netfs Jul 2 01:55:14.911338 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 2 01:55:14.911391 kernel: audit: type=1400 audit(1719885314.903:681): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.903000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.943678 kernel: Failed to create system directory netfs Jul 2 01:55:14.943803 kernel: audit: type=1400 audit(1719885314.903:681): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.943834 kernel: Failed to create system directory netfs Jul 2 01:55:14.903000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.903000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.968849 kernel: audit: type=1400 audit(1719885314.903:681): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.992377 kernel: Failed to create system directory netfs Jul 2 01:55:14.992490 kernel: audit: type=1400 audit(1719885314.903:681): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.903000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:14.903000 audit[3538]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad2c145e0 a1=12c14 a2=aaaab758e028 a3=aaaad2c05010 items=0 ppid=70 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:15.038590 kernel: audit: type=1300 audit(1719885314.903:681): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad2c145e0 a1=12c14 a2=aaaab758e028 a3=aaaad2c05010 items=0 ppid=70 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:14.903000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:15.052665 kernel: audit: type=1327 audit(1719885314.903:681): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:15.052777 kernel: Failed to create system directory fscache Jul 2 01:55:15.052802 kernel: audit: type=1400 audit(1719885315.033:682): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.053125 kubelet[2028]: E0702 01:55:15.053097 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:15.071523 kernel: Failed to create system directory fscache Jul 2 01:55:15.071648 kernel: audit: type=1400 audit(1719885315.033:682): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.118687 kernel: Failed to create system directory fscache Jul 2 01:55:15.118797 kernel: audit: type=1400 audit(1719885315.033:682): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.118825 kernel: Failed to create system directory fscache Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.142277 kernel: audit: type=1400 audit(1719885315.033:682): avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.142398 kernel: Failed to create system directory fscache Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.151595 kernel: Failed to create system directory fscache Jul 2 01:55:15.151651 kernel: Failed to create system directory fscache Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.160657 kernel: Failed to create system directory fscache Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.165171 kernel: Failed to create system directory fscache Jul 2 01:55:15.165238 kernel: Failed to create system directory fscache Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.175053 kernel: Failed to create system directory fscache Jul 2 01:55:15.175126 kernel: Failed to create system directory fscache Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.184401 kernel: Failed to create system directory fscache Jul 2 01:55:15.184454 kernel: Failed to create system directory fscache Jul 2 01:55:15.033000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.192379 kernel: FS-Cache: Loaded Jul 2 01:55:15.033000 audit[3538]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad2e27210 a1=4c344 a2=aaaab758e028 a3=aaaad2c05010 items=0 ppid=70 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:15.033000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.257028 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.257118 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.261353 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.265588 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.269934 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.274209 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.278402 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.282669 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.286803 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.290993 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.295175 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.299487 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.303992 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.308174 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.312192 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.316795 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.321459 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.326130 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.330850 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.335429 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.339313 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.344006 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.348541 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.352837 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.357316 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.361992 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.366554 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.370381 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.374488 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.379068 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.383594 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.388013 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.392416 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.396570 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.400323 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.404016 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.407649 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.411621 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.415804 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.420526 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.424983 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.429232 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.429337 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.436998 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.437091 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.445482 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.445594 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.453824 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.453887 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.462116 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.462200 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.469643 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.474140 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.474190 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.482454 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.482489 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.490689 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.490735 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.498319 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.498390 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.506636 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.506704 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.515111 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.515173 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.522989 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.527343 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.527456 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.535759 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.535816 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.543508 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.543560 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.552193 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.552248 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.560001 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.560090 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.567950 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.568020 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.575270 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.579084 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.579128 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.586549 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.586606 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.593496 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.593597 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.597180 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.600893 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.604370 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.607923 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.611390 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.615008 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.618575 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.625615 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.625689 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.633423 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.633478 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.637076 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.644072 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.644110 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.651396 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.651442 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.658470 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.658526 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.665667 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.665714 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.672838 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.672922 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.680163 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.680226 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.688036 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.688089 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.695521 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.695610 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.702750 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.702808 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.709889 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.709922 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.716985 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.717048 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.724275 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.724351 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.731701 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.731762 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.739264 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.739318 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.747037 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.242000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.757804 kernel: Failed to create system directory sunrpc Jul 2 01:55:15.770510 kernel: RPC: Registered named UNIX socket transport module. Jul 2 01:55:15.770611 kernel: RPC: Registered udp transport module. Jul 2 01:55:15.770651 kernel: RPC: Registered tcp transport module. Jul 2 01:55:15.774220 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 01:55:15.242000 audit[3538]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad2e73560 a1=14a514 a2=aaaab758e028 a3=aaaad2c05010 items=6 ppid=70 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:15.242000 audit: CWD cwd="/" Jul 2 01:55:15.242000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:15.242000 audit: PATH item=1 name=(null) inode=22919 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:15.242000 audit: PATH item=2 name=(null) inode=22919 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:15.242000 audit: PATH item=3 name=(null) inode=22920 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:15.242000 audit: PATH item=4 name=(null) inode=22919 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:15.242000 audit: PATH item=5 name=(null) inode=22921 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:55:15.242000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.866096 kernel: Failed to create system directory nfs Jul 2 01:55:15.866156 kernel: Failed to create system directory nfs Jul 2 01:55:15.866184 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.873766 kernel: Failed to create system directory nfs Jul 2 01:55:15.873809 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.880594 kernel: Failed to create system directory nfs Jul 2 01:55:15.880690 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.884282 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.887743 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.891209 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.898097 kernel: Failed to create system directory nfs Jul 2 01:55:15.898200 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.901818 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.905240 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.908708 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.915749 kernel: Failed to create system directory nfs Jul 2 01:55:15.915818 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.922957 kernel: Failed to create system directory nfs Jul 2 01:55:15.922994 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.929767 kernel: Failed to create system directory nfs Jul 2 01:55:15.929824 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.936737 kernel: Failed to create system directory nfs Jul 2 01:55:15.936798 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.943671 kernel: Failed to create system directory nfs Jul 2 01:55:15.943703 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.950707 kernel: Failed to create system directory nfs Jul 2 01:55:15.950767 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.957465 kernel: Failed to create system directory nfs Jul 2 01:55:15.957500 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.964382 kernel: Failed to create system directory nfs Jul 2 01:55:15.964437 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.971191 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.974870 kernel: Failed to create system directory nfs Jul 2 01:55:15.974923 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.978279 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.982052 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.989685 kernel: Failed to create system directory nfs Jul 2 01:55:15.989743 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.997014 kernel: Failed to create system directory nfs Jul 2 01:55:15.997058 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.003986 kernel: Failed to create system directory nfs Jul 2 01:55:16.004041 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.007465 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.011199 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.014657 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.018180 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.025178 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.029109 kernel: Failed to create system directory nfs Jul 2 01:55:16.029175 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.036150 kernel: Failed to create system directory nfs Jul 2 01:55:16.036205 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.039542 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.043594 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.047209 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.050626 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.053844 kubelet[2028]: E0702 01:55:16.053782 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:16.054255 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.057507 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.060875 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.064268 kernel: Failed to create system directory nfs Jul 2 01:55:15.853000 audit[3538]: AVC avc: denied { confidentiality } for pid=3538 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.086398 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 01:55:15.853000 audit[3538]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad301c740 a1=1158a4 a2=aaaab758e028 a3=aaaad2c05010 items=0 ppid=70 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:15.853000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.160558 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.160639 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.160666 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.167832 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.167888 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.174711 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.178166 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.178216 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.185992 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.189602 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.193129 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.196711 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.200351 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.203891 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.207429 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.210906 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.214522 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.218346 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.221895 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.225542 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.229074 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.232792 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.236396 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.239964 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.243507 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.247216 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.251004 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.254531 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.258405 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.261906 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.265612 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.269100 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.272567 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.276106 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.279674 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.283161 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.286662 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.290121 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.293570 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.297236 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.300754 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.304261 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.311983 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.312049 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.315578 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.319036 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.322522 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.326397 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.329944 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.333487 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.337057 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.340664 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.344451 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.348033 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.351513 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.355038 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.358771 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.362417 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.366397 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.369882 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.373389 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.373460 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.380232 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.380270 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.387001 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.387061 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.394075 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.394118 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.400897 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.400936 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.407745 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.407808 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.414454 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.418242 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.418302 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.425124 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.425174 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.432321 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.432411 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.439454 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.439503 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.446159 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.446241 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.453385 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.453426 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.460276 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.460344 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.467467 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.471259 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.471322 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.478311 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.478363 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.485169 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.485229 kernel: Failed to create system directory nfs4 Jul 2 01:55:16.146000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.594081 kernel: NFS: Registering the id_resolver key type Jul 2 01:55:16.594207 kernel: Key type id_resolver registered Jul 2 01:55:16.594275 kernel: Key type id_legacy registered Jul 2 01:55:16.146000 audit[3543]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8dedb010 a1=19c0bc a2=aaaabdf2e028 a3=aaaae3221010 items=0 ppid=70 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:16.146000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.643552 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.643643 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.643673 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.650839 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.650898 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.658162 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.658226 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.665236 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.668928 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.669001 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.672536 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.680352 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.680419 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.687329 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.692577 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.692649 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.699839 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.703606 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.707686 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.711440 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.715128 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.715166 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.722753 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.722806 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.730079 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.730114 kernel: Failed to create system directory rpcgss Jul 2 01:55:16.632000 audit[3544]: AVC avc: denied { confidentiality } for pid=3544 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 01:55:16.632000 audit[3544]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9fc73010 a1=5ef24 a2=aaaadcdee028 a3=aaaae6ff2010 items=0 ppid=70 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:16.632000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 01:55:17.054181 kubelet[2028]: E0702 01:55:17.054149 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:17.060641 nfsidmap[3551]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-a-62a89fec45' Jul 2 01:55:17.101547 nfsidmap[3552]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-a-62a89fec45' Jul 2 01:55:17.113000 audit[1576]: AVC avc: denied { watch_reads } for pid=1576 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2892 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:17.113000 audit[1576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab04016970 a2=10 a3=0 items=0 ppid=1 pid=1576 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.113000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 01:55:17.113000 audit[1576]: AVC avc: denied { watch_reads } for pid=1576 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2892 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:17.113000 audit[1576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab04016970 a2=10 a3=0 items=0 ppid=1 pid=1576 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.113000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 01:55:17.113000 audit[1576]: AVC avc: denied { watch_reads } for pid=1576 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2892 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:17.113000 audit[1576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab04016970 a2=10 a3=0 items=0 ppid=1 pid=1576 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.113000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 01:55:17.113000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2892 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:17.114000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2892 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:17.114000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2892 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 01:55:17.370101 env[1467]: time="2024-07-02T01:55:17.369958889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d35dd9ee-f514-4648-9f00-3b6b85b6d267,Namespace:default,Attempt:0,}" Jul 2 01:55:17.498785 systemd-networkd[1631]: cali5ec59c6bf6e: Link UP Jul 2 01:55:17.511670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:55:17.511765 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 01:55:17.512859 systemd-networkd[1631]: cali5ec59c6bf6e: Gained carrier Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.433 [INFO][3554] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.48-k8s-test--pod--1-eth0 default d35dd9ee-f514-4648-9f00-3b6b85b6d267 1479 0 2024-07-02 01:54:43 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.48 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.433 [INFO][3554] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.458 [INFO][3565] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" HandleID="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Workload="10.200.20.48-k8s-test--pod--1-eth0" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.471 [INFO][3565] ipam_plugin.go 264: Auto assigning IP ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" HandleID="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Workload="10.200.20.48-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002edd60), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.48", "pod":"test-pod-1", "timestamp":"2024-07-02 01:55:17.458939207 +0000 UTC"}, Hostname:"10.200.20.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.471 [INFO][3565] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.471 [INFO][3565] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.471 [INFO][3565] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.48' Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.473 [INFO][3565] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.476 [INFO][3565] ipam.go 372: Looking up existing affinities for host host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.480 [INFO][3565] ipam.go 489: Trying affinity for 192.168.41.0/26 host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.481 [INFO][3565] ipam.go 155: Attempting to load block cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.483 [INFO][3565] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.0/26 host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.483 [INFO][3565] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.0/26 handle="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.485 [INFO][3565] ipam.go 1685: Creating new handle: k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3 Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.488 [INFO][3565] ipam.go 1203: Writing block in order to claim IPs block=192.168.41.0/26 handle="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.492 [INFO][3565] ipam.go 1216: Successfully claimed IPs: [192.168.41.4/26] block=192.168.41.0/26 handle="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.492 [INFO][3565] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.4/26] handle="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" host="10.200.20.48" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.493 [INFO][3565] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.493 [INFO][3565] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.41.4/26] IPv6=[] ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" HandleID="k8s-pod-network.8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Workload="10.200.20.48-k8s-test--pod--1-eth0" Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.494 [INFO][3554] k8s.go 386: Populated endpoint ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d35dd9ee-f514-4648-9f00-3b6b85b6d267", ResourceVersion:"1479", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:17.520250 env[1467]: 2024-07-02 01:55:17.494 [INFO][3554] k8s.go 387: Calico CNI using IPs: [192.168.41.4/32] ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Jul 2 01:55:17.520990 env[1467]: 2024-07-02 01:55:17.494 [INFO][3554] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Jul 2 01:55:17.520990 env[1467]: 2024-07-02 01:55:17.512 [INFO][3554] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Jul 2 01:55:17.520990 env[1467]: 2024-07-02 01:55:17.513 [INFO][3554] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.48-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d35dd9ee-f514-4648-9f00-3b6b85b6d267", ResourceVersion:"1479", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 54, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.48", ContainerID:"8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.41.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"da:86:7b:c2:e0:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:55:17.520990 env[1467]: 2024-07-02 01:55:17.518 [INFO][3554] k8s.go 500: Wrote updated endpoint to datastore ContainerID="8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.48-k8s-test--pod--1-eth0" Jul 2 01:55:17.531000 audit[3586]: NETFILTER_CFG table=filter:84 family=2 entries=34 op=nft_register_chain pid=3586 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:55:17.531000 audit[3586]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18196 a0=3 a1=ffffc0c4e420 a2=0 a3=ffff87939fa8 items=0 ppid=2663 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.531000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:55:17.541018 env[1467]: time="2024-07-02T01:55:17.540932099Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:55:17.541018 env[1467]: time="2024-07-02T01:55:17.540977419Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:55:17.541018 env[1467]: time="2024-07-02T01:55:17.540988460Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:55:17.541489 env[1467]: time="2024-07-02T01:55:17.541434461Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3 pid=3594 runtime=io.containerd.runc.v2 Jul 2 01:55:17.562119 systemd[1]: Started cri-containerd-8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3.scope. Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.575000 audit: BPF prog-id=106 op=LOAD Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3594 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831383564646665343965343339336532656635366139363265613236 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3594 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831383564646665343965343339336532656635366139363265613236 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit: BPF prog-id=107 op=LOAD Jul 2 01:55:17.576000 audit[3604]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3594 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831383564646665343965343339336532656635366139363265613236 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit: BPF prog-id=108 op=LOAD Jul 2 01:55:17.576000 audit[3604]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3594 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831383564646665343965343339336532656635366139363265613236 Jul 2 01:55:17.576000 audit: BPF prog-id=108 op=UNLOAD Jul 2 01:55:17.576000 audit: BPF prog-id=107 op=UNLOAD Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:17.576000 audit: BPF prog-id=109 op=LOAD Jul 2 01:55:17.576000 audit[3604]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3594 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:17.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831383564646665343965343339336532656635366139363265613236 Jul 2 01:55:17.598664 env[1467]: time="2024-07-02T01:55:17.598618425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d35dd9ee-f514-4648-9f00-3b6b85b6d267,Namespace:default,Attempt:0,} returns sandbox id \"8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3\"" Jul 2 01:55:17.602606 env[1467]: time="2024-07-02T01:55:17.602563559Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 01:55:17.933276 env[1467]: time="2024-07-02T01:55:17.933226060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:17.940780 env[1467]: time="2024-07-02T01:55:17.940729686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:17.945290 env[1467]: time="2024-07-02T01:55:17.945240262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:17.950704 env[1467]: time="2024-07-02T01:55:17.950655202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:55:17.951555 env[1467]: time="2024-07-02T01:55:17.951527085Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:2d3caadc252cc3b24921aae8c484cb83879b0b39cb20bb8d23a3a54872427653\"" Jul 2 01:55:17.954527 env[1467]: time="2024-07-02T01:55:17.954494416Z" level=info msg="CreateContainer within sandbox \"8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 01:55:17.990082 env[1467]: time="2024-07-02T01:55:17.990027102Z" level=info msg="CreateContainer within sandbox \"8185ddfe49e4393e2ef56a962ea26447d8922b3f0f9e2631979b4efeb19e87f3\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c22332964f88075c188d3d80efb958c9866762ca6fa4cb79418a94ba90494130\"" Jul 2 01:55:17.990908 env[1467]: time="2024-07-02T01:55:17.990878025Z" level=info msg="StartContainer for \"c22332964f88075c188d3d80efb958c9866762ca6fa4cb79418a94ba90494130\"" Jul 2 01:55:18.006374 systemd[1]: Started cri-containerd-c22332964f88075c188d3d80efb958c9866762ca6fa4cb79418a94ba90494130.scope. Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.018000 audit: BPF prog-id=110 op=LOAD Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3594 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:18.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323333323936346638383037356331383864336438306566623935 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3594 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:18.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323333323936346638383037356331383864336438306566623935 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit: BPF prog-id=111 op=LOAD Jul 2 01:55:18.019000 audit[3635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3594 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:18.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323333323936346638383037356331383864336438306566623935 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit: BPF prog-id=112 op=LOAD Jul 2 01:55:18.019000 audit[3635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3594 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:18.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323333323936346638383037356331383864336438306566623935 Jul 2 01:55:18.019000 audit: BPF prog-id=112 op=UNLOAD Jul 2 01:55:18.019000 audit: BPF prog-id=111 op=UNLOAD Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:18.019000 audit: BPF prog-id=113 op=LOAD Jul 2 01:55:18.019000 audit[3635]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3594 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:18.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323333323936346638383037356331383864336438306566623935 Jul 2 01:55:18.038789 env[1467]: time="2024-07-02T01:55:18.038732395Z" level=info msg="StartContainer for \"c22332964f88075c188d3d80efb958c9866762ca6fa4cb79418a94ba90494130\" returns successfully" Jul 2 01:55:18.055039 kubelet[2028]: E0702 01:55:18.054967 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:19.055373 kubelet[2028]: E0702 01:55:19.055298 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:19.525562 systemd-networkd[1631]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 01:55:20.056063 kubelet[2028]: E0702 01:55:20.056015 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:20.717566 systemd[1]: run-containerd-runc-k8s.io-90efa87dbca555e63a6bfec43a1e6e05ec3263bb2e7e5a14adadfaf1e703eca3-runc.zFLGIt.mount: Deactivated successfully. Jul 2 01:55:21.057111 kubelet[2028]: E0702 01:55:21.057058 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:22.057399 kubelet[2028]: E0702 01:55:22.057341 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:23.058538 kubelet[2028]: E0702 01:55:23.058490 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:24.058923 kubelet[2028]: E0702 01:55:24.058887 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:25.059140 kubelet[2028]: E0702 01:55:25.059103 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:26.059584 kubelet[2028]: E0702 01:55:26.059550 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:27.060015 kubelet[2028]: E0702 01:55:27.059978 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:28.060621 kubelet[2028]: E0702 01:55:28.060587 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:29.061085 kubelet[2028]: E0702 01:55:29.061053 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:30.062413 kubelet[2028]: E0702 01:55:30.062337 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:31.063262 kubelet[2028]: E0702 01:55:31.063228 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:32.064150 kubelet[2028]: E0702 01:55:32.064110 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:33.065218 kubelet[2028]: E0702 01:55:33.065178 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:33.984565 kubelet[2028]: E0702 01:55:33.984533 2028 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:34.066138 kubelet[2028]: E0702 01:55:34.066103 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:35.067191 kubelet[2028]: E0702 01:55:35.067146 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:35.278534 kubelet[2028]: E0702 01:55:35.278483 2028 controller.go:195] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.43:53302->10.200.20.31:2379: read: connection timed out" Jul 2 01:55:36.067335 kubelet[2028]: E0702 01:55:36.067296 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:37.068683 kubelet[2028]: E0702 01:55:37.068647 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:38.069611 kubelet[2028]: E0702 01:55:38.069575 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:39.070794 kubelet[2028]: E0702 01:55:39.070755 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:40.071424 kubelet[2028]: E0702 01:55:40.071388 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:41.072257 kubelet[2028]: E0702 01:55:41.072224 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:42.073065 kubelet[2028]: E0702 01:55:42.073032 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:43.074563 kubelet[2028]: E0702 01:55:43.074523 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:44.074775 kubelet[2028]: E0702 01:55:44.074730 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:45.075083 kubelet[2028]: E0702 01:55:45.075050 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:45.278978 kubelet[2028]: E0702 01:55:45.278936 2028 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:55:46.076074 kubelet[2028]: E0702 01:55:46.076043 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:47.076543 kubelet[2028]: E0702 01:55:47.076497 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:48.078735 kubelet[2028]: E0702 01:55:48.078693 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:49.080008 kubelet[2028]: E0702 01:55:49.079976 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:50.081521 kubelet[2028]: E0702 01:55:50.081483 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:51.082502 kubelet[2028]: E0702 01:55:51.082467 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:52.082841 kubelet[2028]: E0702 01:55:52.082802 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:53.083820 kubelet[2028]: E0702 01:55:53.083778 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:53.984223 kubelet[2028]: E0702 01:55:53.984184 2028 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:54.084560 kubelet[2028]: E0702 01:55:54.084460 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:55.084610 kubelet[2028]: E0702 01:55:55.084578 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:55.279456 kubelet[2028]: E0702 01:55:55.279402 2028 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:55:56.085445 kubelet[2028]: E0702 01:55:56.085409 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:57.085693 kubelet[2028]: E0702 01:55:57.085652 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:58.086988 kubelet[2028]: E0702 01:55:58.086956 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:55:59.087706 kubelet[2028]: E0702 01:55:59.087667 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:00.088813 kubelet[2028]: E0702 01:56:00.088725 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:01.089830 kubelet[2028]: E0702 01:56:01.089795 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:02.090146 kubelet[2028]: E0702 01:56:02.090115 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:03.090999 kubelet[2028]: E0702 01:56:03.090968 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:04.091703 kubelet[2028]: E0702 01:56:04.091674 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:05.092862 kubelet[2028]: E0702 01:56:05.092824 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:05.279806 kubelet[2028]: E0702 01:56:05.279763 2028 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:06.093615 kubelet[2028]: E0702 01:56:06.093569 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:07.093904 kubelet[2028]: E0702 01:56:07.093806 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:08.094327 kubelet[2028]: E0702 01:56:08.094300 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:09.095063 kubelet[2028]: E0702 01:56:09.095027 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:10.096078 kubelet[2028]: E0702 01:56:10.096042 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:11.096932 kubelet[2028]: E0702 01:56:11.096903 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:12.098058 kubelet[2028]: E0702 01:56:12.098026 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:13.098388 kubelet[2028]: E0702 01:56:13.098334 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:13.984177 kubelet[2028]: E0702 01:56:13.984140 2028 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:14.099097 kubelet[2028]: E0702 01:56:14.099069 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:15.100063 kubelet[2028]: E0702 01:56:15.100026 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:15.280920 kubelet[2028]: E0702 01:56:15.280874 2028 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:15.280920 kubelet[2028]: I0702 01:56:15.280920 2028 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Jul 2 01:56:16.100259 kubelet[2028]: E0702 01:56:16.100230 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:16.502186 kubelet[2028]: E0702 01:56:16.501853 2028 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"10.200.20.48\": Get \"https://10.200.20.43:6443/api/v1/nodes/10.200.20.48?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:17.101020 kubelet[2028]: E0702 01:56:17.100984 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:18.101627 kubelet[2028]: E0702 01:56:18.101597 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:19.102623 kubelet[2028]: E0702 01:56:19.102559 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:20.103296 kubelet[2028]: E0702 01:56:20.103250 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:21.104073 kubelet[2028]: E0702 01:56:21.104038 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:22.104548 kubelet[2028]: E0702 01:56:22.104512 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:23.104820 kubelet[2028]: E0702 01:56:23.104780 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:24.105374 kubelet[2028]: E0702 01:56:24.105336 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:25.106119 kubelet[2028]: E0702 01:56:25.106084 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:25.281912 kubelet[2028]: E0702 01:56:25.281865 2028 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Jul 2 01:56:26.107136 kubelet[2028]: E0702 01:56:26.107107 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 01:56:26.503431 kubelet[2028]: E0702 01:56:26.503312 2028 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"10.200.20.48\": Get \"https://10.200.20.43:6443/api/v1/nodes/10.200.20.48?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:56:27.108201 kubelet[2028]: E0702 01:56:27.108163 2028 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"