Apr 12 20:53:11.567277 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 20:53:11.567290 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:53:11.567297 kernel: BIOS-provided physical RAM map: Apr 12 20:53:11.567301 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 20:53:11.567304 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 20:53:11.567308 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 20:53:11.567313 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 20:53:11.567317 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 20:53:11.567320 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b2cfff] usable Apr 12 20:53:11.567324 kernel: BIOS-e820: [mem 0x0000000081b2d000-0x0000000081b2dfff] ACPI NVS Apr 12 20:53:11.567329 kernel: BIOS-e820: [mem 0x0000000081b2e000-0x0000000081b2efff] reserved Apr 12 20:53:11.567333 kernel: BIOS-e820: [mem 0x0000000081b2f000-0x000000008afccfff] usable Apr 12 20:53:11.567337 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Apr 12 20:53:11.567341 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Apr 12 20:53:11.567346 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Apr 12 20:53:11.567351 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Apr 12 20:53:11.567355 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Apr 12 20:53:11.567359 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Apr 12 20:53:11.567364 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 20:53:11.567368 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 20:53:11.567372 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 20:53:11.567376 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 20:53:11.567380 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 20:53:11.567384 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Apr 12 20:53:11.567388 kernel: NX (Execute Disable) protection: active Apr 12 20:53:11.567393 kernel: SMBIOS 3.2.1 present. Apr 12 20:53:11.567398 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Apr 12 20:53:11.567402 kernel: tsc: Detected 3400.000 MHz processor Apr 12 20:53:11.567406 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 20:53:11.567411 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 20:53:11.567415 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 20:53:11.567420 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Apr 12 20:53:11.567424 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 20:53:11.567428 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Apr 12 20:53:11.567433 kernel: Using GB pages for direct mapping Apr 12 20:53:11.567437 kernel: ACPI: Early table checksum verification disabled Apr 12 20:53:11.567442 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 20:53:11.567447 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 20:53:11.567451 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Apr 12 20:53:11.567455 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 20:53:11.567462 kernel: ACPI: FACS 0x000000008C66CF80 000040 Apr 12 20:53:11.567467 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Apr 12 20:53:11.567472 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Apr 12 20:53:11.567477 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 20:53:11.567482 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 20:53:11.567486 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 20:53:11.567491 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 20:53:11.567496 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 20:53:11.567500 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 20:53:11.567505 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:53:11.567510 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 20:53:11.567515 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 20:53:11.567520 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:53:11.567525 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:53:11.567530 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 20:53:11.567534 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 20:53:11.567539 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:53:11.567543 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:53:11.567549 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 20:53:11.567554 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Apr 12 20:53:11.567558 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 20:53:11.567563 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 20:53:11.567568 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 20:53:11.567572 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Apr 12 20:53:11.567577 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 20:53:11.567582 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 20:53:11.567586 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 20:53:11.567592 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 20:53:11.567597 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 20:53:11.567601 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Apr 12 20:53:11.567606 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Apr 12 20:53:11.567611 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Apr 12 20:53:11.567615 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Apr 12 20:53:11.567620 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Apr 12 20:53:11.567625 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Apr 12 20:53:11.567629 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Apr 12 20:53:11.567635 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Apr 12 20:53:11.567640 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Apr 12 20:53:11.567644 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Apr 12 20:53:11.567649 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Apr 12 20:53:11.567653 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Apr 12 20:53:11.567658 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Apr 12 20:53:11.567663 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Apr 12 20:53:11.567667 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Apr 12 20:53:11.567673 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Apr 12 20:53:11.567678 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Apr 12 20:53:11.567682 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Apr 12 20:53:11.567687 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Apr 12 20:53:11.567691 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Apr 12 20:53:11.567696 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Apr 12 20:53:11.567701 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Apr 12 20:53:11.567705 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Apr 12 20:53:11.567710 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Apr 12 20:53:11.567716 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Apr 12 20:53:11.567720 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Apr 12 20:53:11.567725 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Apr 12 20:53:11.567729 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Apr 12 20:53:11.567734 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Apr 12 20:53:11.567752 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Apr 12 20:53:11.567757 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Apr 12 20:53:11.567762 kernel: No NUMA configuration found Apr 12 20:53:11.567766 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Apr 12 20:53:11.567771 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Apr 12 20:53:11.567776 kernel: Zone ranges: Apr 12 20:53:11.567781 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 20:53:11.567786 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 20:53:11.567790 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Apr 12 20:53:11.567795 kernel: Movable zone start for each node Apr 12 20:53:11.567799 kernel: Early memory node ranges Apr 12 20:53:11.567804 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 20:53:11.567808 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 20:53:11.567813 kernel: node 0: [mem 0x0000000040400000-0x0000000081b2cfff] Apr 12 20:53:11.567818 kernel: node 0: [mem 0x0000000081b2f000-0x000000008afccfff] Apr 12 20:53:11.567823 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Apr 12 20:53:11.567827 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Apr 12 20:53:11.567832 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Apr 12 20:53:11.567837 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Apr 12 20:53:11.567841 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 20:53:11.567849 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 20:53:11.567855 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 20:53:11.567860 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 20:53:11.567865 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Apr 12 20:53:11.567871 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Apr 12 20:53:11.567876 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Apr 12 20:53:11.567881 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Apr 12 20:53:11.567886 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 20:53:11.567891 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 20:53:11.567896 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 20:53:11.567900 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 20:53:11.567906 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 20:53:11.567911 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 20:53:11.567916 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 20:53:11.567921 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 20:53:11.567926 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 20:53:11.567931 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 20:53:11.567935 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 20:53:11.567940 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 20:53:11.567945 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 20:53:11.567951 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 20:53:11.567956 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 20:53:11.567961 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 20:53:11.567966 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 20:53:11.567971 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 20:53:11.567975 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 20:53:11.567980 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 20:53:11.567985 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 20:53:11.567990 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 20:53:11.567996 kernel: TSC deadline timer available Apr 12 20:53:11.568001 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 20:53:11.568006 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Apr 12 20:53:11.568011 kernel: Booting paravirtualized kernel on bare hardware Apr 12 20:53:11.568016 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 20:53:11.568021 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 20:53:11.568026 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 20:53:11.568031 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 20:53:11.568036 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 20:53:11.568041 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Apr 12 20:53:11.568046 kernel: Policy zone: Normal Apr 12 20:53:11.568052 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:53:11.568057 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 20:53:11.568062 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 20:53:11.568067 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 20:53:11.568072 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 20:53:11.568078 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 730116K reserved, 0K cma-reserved) Apr 12 20:53:11.568083 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 20:53:11.568088 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 20:53:11.568093 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 20:53:11.568098 kernel: rcu: Hierarchical RCU implementation. Apr 12 20:53:11.568103 kernel: rcu: RCU event tracing is enabled. Apr 12 20:53:11.568108 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 20:53:11.568113 kernel: Rude variant of Tasks RCU enabled. Apr 12 20:53:11.568118 kernel: Tracing variant of Tasks RCU enabled. Apr 12 20:53:11.568124 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 20:53:11.568129 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 20:53:11.568134 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 20:53:11.568139 kernel: random: crng init done Apr 12 20:53:11.568143 kernel: Console: colour dummy device 80x25 Apr 12 20:53:11.568148 kernel: printk: console [tty0] enabled Apr 12 20:53:11.568153 kernel: printk: console [ttyS1] enabled Apr 12 20:53:11.568158 kernel: ACPI: Core revision 20210730 Apr 12 20:53:11.568163 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Apr 12 20:53:11.568168 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 20:53:11.568174 kernel: DMAR: Host address width 39 Apr 12 20:53:11.568179 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 20:53:11.568184 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 20:53:11.568189 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Apr 12 20:53:11.568193 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Apr 12 20:53:11.568198 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 20:53:11.568203 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 20:53:11.568208 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 20:53:11.568213 kernel: x2apic enabled Apr 12 20:53:11.568219 kernel: Switched APIC routing to cluster x2apic. Apr 12 20:53:11.568224 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 20:53:11.568231 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 20:53:11.568236 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 20:53:11.568241 kernel: process: using mwait in idle threads Apr 12 20:53:11.568265 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 20:53:11.568270 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 20:53:11.568274 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 20:53:11.568279 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 20:53:11.568300 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 20:53:11.568304 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 20:53:11.568309 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 20:53:11.568314 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 20:53:11.568319 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 20:53:11.568324 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 20:53:11.568328 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 20:53:11.568333 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 20:53:11.568338 kernel: TAA: Mitigation: TSX disabled Apr 12 20:53:11.568343 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 20:53:11.568348 kernel: SRBDS: Mitigation: Microcode Apr 12 20:53:11.568354 kernel: GDS: Vulnerable: No microcode Apr 12 20:53:11.568359 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 20:53:11.568364 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 20:53:11.568368 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 20:53:11.568373 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 20:53:11.568378 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 20:53:11.568383 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 20:53:11.568388 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 20:53:11.568393 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 20:53:11.568397 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 20:53:11.568402 kernel: Freeing SMP alternatives memory: 32K Apr 12 20:53:11.568408 kernel: pid_max: default: 32768 minimum: 301 Apr 12 20:53:11.568413 kernel: LSM: Security Framework initializing Apr 12 20:53:11.568418 kernel: SELinux: Initializing. Apr 12 20:53:11.568423 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:53:11.568427 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:53:11.568432 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 20:53:11.568437 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 20:53:11.568442 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 20:53:11.568447 kernel: ... version: 4 Apr 12 20:53:11.568452 kernel: ... bit width: 48 Apr 12 20:53:11.568457 kernel: ... generic registers: 4 Apr 12 20:53:11.568463 kernel: ... value mask: 0000ffffffffffff Apr 12 20:53:11.568468 kernel: ... max period: 00007fffffffffff Apr 12 20:53:11.568473 kernel: ... fixed-purpose events: 3 Apr 12 20:53:11.568477 kernel: ... event mask: 000000070000000f Apr 12 20:53:11.568482 kernel: signal: max sigframe size: 2032 Apr 12 20:53:11.568487 kernel: rcu: Hierarchical SRCU implementation. Apr 12 20:53:11.568492 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 20:53:11.568497 kernel: smp: Bringing up secondary CPUs ... Apr 12 20:53:11.568502 kernel: x86: Booting SMP configuration: Apr 12 20:53:11.568508 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 20:53:11.568513 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 20:53:11.568518 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 20:53:11.568523 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 20:53:11.568528 kernel: smpboot: Max logical packages: 1 Apr 12 20:53:11.568533 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 20:53:11.568538 kernel: devtmpfs: initialized Apr 12 20:53:11.568542 kernel: x86/mm: Memory block size: 128MB Apr 12 20:53:11.568547 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b2d000-0x81b2dfff] (4096 bytes) Apr 12 20:53:11.568553 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Apr 12 20:53:11.568558 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 20:53:11.568563 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 20:53:11.568568 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 20:53:11.568573 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 20:53:11.568578 kernel: audit: initializing netlink subsys (disabled) Apr 12 20:53:11.568583 kernel: audit: type=2000 audit(1712955186.041:1): state=initialized audit_enabled=0 res=1 Apr 12 20:53:11.568588 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 20:53:11.568594 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 20:53:11.568599 kernel: cpuidle: using governor menu Apr 12 20:53:11.568603 kernel: ACPI: bus type PCI registered Apr 12 20:53:11.568608 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 20:53:11.568613 kernel: dca service started, version 1.12.1 Apr 12 20:53:11.568618 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 20:53:11.568623 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 20:53:11.568628 kernel: PCI: Using configuration type 1 for base access Apr 12 20:53:11.568633 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 20:53:11.568639 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 20:53:11.568644 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 20:53:11.568649 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 20:53:11.568653 kernel: ACPI: Added _OSI(Module Device) Apr 12 20:53:11.568658 kernel: ACPI: Added _OSI(Processor Device) Apr 12 20:53:11.568663 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 20:53:11.568668 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 20:53:11.568673 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 20:53:11.568678 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 20:53:11.568683 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 20:53:11.568689 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 20:53:11.568694 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:53:11.568699 kernel: ACPI: SSDT 0xFFFF919FC0221200 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 20:53:11.568704 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 20:53:11.568709 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:53:11.568713 kernel: ACPI: SSDT 0xFFFF919FC1AEA000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 20:53:11.568718 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:53:11.568723 kernel: ACPI: SSDT 0xFFFF919FC1A63800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 20:53:11.568728 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:53:11.568734 kernel: ACPI: SSDT 0xFFFF919FC1B52000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 20:53:11.568739 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:53:11.568743 kernel: ACPI: SSDT 0xFFFF919FC0156000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 20:53:11.568748 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:53:11.568753 kernel: ACPI: SSDT 0xFFFF919FC1AEF400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 20:53:11.568758 kernel: ACPI: Interpreter enabled Apr 12 20:53:11.568763 kernel: ACPI: PM: (supports S0 S5) Apr 12 20:53:11.568768 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 20:53:11.568773 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 20:53:11.568779 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 20:53:11.568784 kernel: HEST: Table parsing has been initialized. Apr 12 20:53:11.568789 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 20:53:11.568793 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 20:53:11.568798 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 20:53:11.568803 kernel: ACPI: PM: Power Resource [USBC] Apr 12 20:53:11.568808 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 20:53:11.568813 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 20:53:11.568818 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 20:53:11.568824 kernel: ACPI: PM: Power Resource [WRST] Apr 12 20:53:11.568829 kernel: ACPI: PM: Power Resource [FN00] Apr 12 20:53:11.568833 kernel: ACPI: PM: Power Resource [FN01] Apr 12 20:53:11.568838 kernel: ACPI: PM: Power Resource [FN02] Apr 12 20:53:11.568843 kernel: ACPI: PM: Power Resource [FN03] Apr 12 20:53:11.568848 kernel: ACPI: PM: Power Resource [FN04] Apr 12 20:53:11.568853 kernel: ACPI: PM: Power Resource [PIN] Apr 12 20:53:11.568857 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 20:53:11.568924 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:53:11.568972 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 20:53:11.569013 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 20:53:11.569020 kernel: PCI host bridge to bus 0000:00 Apr 12 20:53:11.569063 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 20:53:11.569102 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 20:53:11.569139 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 20:53:11.569177 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Apr 12 20:53:11.569215 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 20:53:11.569273 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 20:53:11.569325 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 20:53:11.569376 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 20:53:11.569421 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.569468 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 20:53:11.569513 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Apr 12 20:53:11.569560 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 20:53:11.569604 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Apr 12 20:53:11.569653 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 20:53:11.569696 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Apr 12 20:53:11.569740 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 20:53:11.569787 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 20:53:11.569831 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Apr 12 20:53:11.569873 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Apr 12 20:53:11.569919 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 20:53:11.569962 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:53:11.570007 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 20:53:11.570053 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:53:11.570101 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 20:53:11.570144 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Apr 12 20:53:11.570186 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 20:53:11.570234 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 20:53:11.570277 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Apr 12 20:53:11.570319 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 20:53:11.570367 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 20:53:11.570410 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Apr 12 20:53:11.570452 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 20:53:11.570498 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 20:53:11.570541 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Apr 12 20:53:11.570584 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Apr 12 20:53:11.570633 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Apr 12 20:53:11.570679 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Apr 12 20:53:11.570720 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Apr 12 20:53:11.570763 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Apr 12 20:53:11.570805 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 20:53:11.570853 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 20:53:11.570896 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.570944 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 20:53:11.570989 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.571039 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 20:53:11.571082 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.571131 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 20:53:11.571175 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.571223 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Apr 12 20:53:11.571311 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.571360 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 20:53:11.571402 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:53:11.571451 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 20:53:11.571512 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 20:53:11.571555 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Apr 12 20:53:11.571596 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 20:53:11.571644 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 20:53:11.571686 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 20:53:11.571736 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 20:53:11.571779 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 20:53:11.571822 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Apr 12 20:53:11.571866 kernel: pci 0000:01:00.0: PME# supported from D3cold Apr 12 20:53:11.571908 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:53:11.571951 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:53:11.571999 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 20:53:11.572046 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 20:53:11.572089 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Apr 12 20:53:11.572133 kernel: pci 0000:01:00.1: PME# supported from D3cold Apr 12 20:53:11.572176 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:53:11.572220 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:53:11.572290 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:53:11.572352 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 20:53:11.572395 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:53:11.572437 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 20:53:11.572485 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Apr 12 20:53:11.572528 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:53:11.572572 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Apr 12 20:53:11.572615 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 20:53:11.572658 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Apr 12 20:53:11.572701 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.572746 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 20:53:11.572787 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:53:11.572830 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 20:53:11.572876 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 20:53:11.572920 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:53:11.572964 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Apr 12 20:53:11.573007 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 20:53:11.573052 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Apr 12 20:53:11.573152 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:53:11.573216 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 20:53:11.573321 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:53:11.573364 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 20:53:11.573406 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 20:53:11.573455 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 20:53:11.573500 kernel: pci 0000:06:00.0: enabling Extended Tags Apr 12 20:53:11.573545 kernel: pci 0000:06:00.0: supports D1 D2 Apr 12 20:53:11.573588 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:53:11.573630 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 20:53:11.573672 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 20:53:11.573713 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:53:11.573763 kernel: pci_bus 0000:07: extended config space not accessible Apr 12 20:53:11.573813 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 20:53:11.573862 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Apr 12 20:53:11.573908 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Apr 12 20:53:11.573955 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 20:53:11.574000 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 20:53:11.574046 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 20:53:11.574092 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:53:11.574137 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 20:53:11.574182 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:53:11.574227 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:53:11.574237 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 20:53:11.574270 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 20:53:11.574275 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 20:53:11.574280 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 20:53:11.574306 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 20:53:11.574311 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 20:53:11.574316 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 20:53:11.574323 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 20:53:11.574328 kernel: iommu: Default domain type: Translated Apr 12 20:53:11.574333 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 20:53:11.574380 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Apr 12 20:53:11.574426 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 20:53:11.574471 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Apr 12 20:53:11.574478 kernel: vgaarb: loaded Apr 12 20:53:11.574484 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 20:53:11.574491 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 20:53:11.574496 kernel: PTP clock support registered Apr 12 20:53:11.574501 kernel: PCI: Using ACPI for IRQ routing Apr 12 20:53:11.574507 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 20:53:11.574512 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 20:53:11.574517 kernel: e820: reserve RAM buffer [mem 0x81b2d000-0x83ffffff] Apr 12 20:53:11.574522 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Apr 12 20:53:11.574527 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Apr 12 20:53:11.574532 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Apr 12 20:53:11.574538 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Apr 12 20:53:11.574543 kernel: clocksource: Switched to clocksource tsc-early Apr 12 20:53:11.574549 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 20:53:11.574554 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 20:53:11.574559 kernel: pnp: PnP ACPI init Apr 12 20:53:11.574603 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 20:53:11.574646 kernel: pnp 00:02: [dma 0 disabled] Apr 12 20:53:11.574689 kernel: pnp 00:03: [dma 0 disabled] Apr 12 20:53:11.574731 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 20:53:11.574769 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 20:53:11.574814 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 20:53:11.574855 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 20:53:11.574893 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 20:53:11.574930 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 20:53:11.574971 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 20:53:11.575008 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 20:53:11.575045 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 20:53:11.575084 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 20:53:11.575120 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 20:53:11.575163 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 20:53:11.575201 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 20:53:11.575271 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 20:53:11.575347 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 20:53:11.575384 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 20:53:11.575422 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 20:53:11.575459 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 20:53:11.575501 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 20:53:11.575509 kernel: pnp: PnP ACPI: found 10 devices Apr 12 20:53:11.575516 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 20:53:11.575521 kernel: NET: Registered PF_INET protocol family Apr 12 20:53:11.575527 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:53:11.575532 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 20:53:11.575537 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 20:53:11.575543 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:53:11.575548 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 20:53:11.575553 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 20:53:11.575560 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:53:11.575566 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:53:11.575571 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 20:53:11.575576 kernel: NET: Registered PF_XDP protocol family Apr 12 20:53:11.575618 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Apr 12 20:53:11.575660 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Apr 12 20:53:11.575701 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Apr 12 20:53:11.575747 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:53:11.575790 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:53:11.575836 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:53:11.575879 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:53:11.575921 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:53:11.575964 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 20:53:11.576006 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:53:11.576049 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 20:53:11.576093 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 20:53:11.576136 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:53:11.576177 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 20:53:11.576219 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 20:53:11.576312 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:53:11.576374 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 20:53:11.576416 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 20:53:11.576461 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 20:53:11.576505 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:53:11.576548 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:53:11.576590 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 20:53:11.576631 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 20:53:11.576673 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:53:11.576712 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 20:53:11.576749 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 20:53:11.576789 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 20:53:11.576826 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 20:53:11.576863 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Apr 12 20:53:11.576900 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 20:53:11.576943 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Apr 12 20:53:11.576984 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:53:11.577030 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Apr 12 20:53:11.577072 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Apr 12 20:53:11.577114 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Apr 12 20:53:11.577154 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Apr 12 20:53:11.577196 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Apr 12 20:53:11.577238 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Apr 12 20:53:11.577343 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 20:53:11.577383 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Apr 12 20:53:11.577392 kernel: PCI: CLS 64 bytes, default 64 Apr 12 20:53:11.577398 kernel: DMAR: No ATSR found Apr 12 20:53:11.577403 kernel: DMAR: No SATC found Apr 12 20:53:11.577409 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 20:53:11.577451 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 20:53:11.577495 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 20:53:11.577538 kernel: pci 0000:00:08.0: Adding to iommu group 2 Apr 12 20:53:11.577580 kernel: pci 0000:00:12.0: Adding to iommu group 3 Apr 12 20:53:11.577624 kernel: pci 0000:00:14.0: Adding to iommu group 4 Apr 12 20:53:11.577665 kernel: pci 0000:00:14.2: Adding to iommu group 4 Apr 12 20:53:11.577707 kernel: pci 0000:00:15.0: Adding to iommu group 5 Apr 12 20:53:11.577748 kernel: pci 0000:00:15.1: Adding to iommu group 5 Apr 12 20:53:11.577790 kernel: pci 0000:00:16.0: Adding to iommu group 6 Apr 12 20:53:11.577832 kernel: pci 0000:00:16.1: Adding to iommu group 6 Apr 12 20:53:11.577872 kernel: pci 0000:00:16.4: Adding to iommu group 6 Apr 12 20:53:11.577914 kernel: pci 0000:00:17.0: Adding to iommu group 7 Apr 12 20:53:11.577957 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Apr 12 20:53:11.578000 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Apr 12 20:53:11.578041 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Apr 12 20:53:11.578083 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Apr 12 20:53:11.578125 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Apr 12 20:53:11.578166 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Apr 12 20:53:11.578209 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Apr 12 20:53:11.578278 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Apr 12 20:53:11.578341 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Apr 12 20:53:11.578386 kernel: pci 0000:01:00.0: Adding to iommu group 1 Apr 12 20:53:11.578430 kernel: pci 0000:01:00.1: Adding to iommu group 1 Apr 12 20:53:11.578473 kernel: pci 0000:03:00.0: Adding to iommu group 15 Apr 12 20:53:11.578516 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 20:53:11.578559 kernel: pci 0000:06:00.0: Adding to iommu group 17 Apr 12 20:53:11.578603 kernel: pci 0000:07:00.0: Adding to iommu group 17 Apr 12 20:53:11.578611 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 20:53:11.578616 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 20:53:11.578623 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Apr 12 20:53:11.578628 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Apr 12 20:53:11.578634 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 20:53:11.578639 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 20:53:11.578644 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 20:53:11.578689 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 20:53:11.578697 kernel: Initialise system trusted keyrings Apr 12 20:53:11.578703 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 20:53:11.578709 kernel: Key type asymmetric registered Apr 12 20:53:11.578715 kernel: Asymmetric key parser 'x509' registered Apr 12 20:53:11.578720 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 20:53:11.578725 kernel: io scheduler mq-deadline registered Apr 12 20:53:11.578730 kernel: io scheduler kyber registered Apr 12 20:53:11.578736 kernel: io scheduler bfq registered Apr 12 20:53:11.578778 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Apr 12 20:53:11.578820 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Apr 12 20:53:11.578863 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Apr 12 20:53:11.578908 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Apr 12 20:53:11.578949 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Apr 12 20:53:11.578992 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Apr 12 20:53:11.579037 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 20:53:11.579045 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 20:53:11.579051 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 20:53:11.579056 kernel: pstore: Registered erst as persistent store backend Apr 12 20:53:11.579063 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 20:53:11.579068 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 20:53:11.579073 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 20:53:11.579079 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 20:53:11.579084 kernel: hpet_acpi_add: no address or irqs in _CRS Apr 12 20:53:11.579129 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 20:53:11.579137 kernel: i8042: PNP: No PS/2 controller found. Apr 12 20:53:11.579175 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 20:53:11.579217 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 20:53:11.579283 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T20:53:10 UTC (1712955190) Apr 12 20:53:11.579322 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 20:53:11.579330 kernel: fail to initialize ptp_kvm Apr 12 20:53:11.579335 kernel: intel_pstate: Intel P-state driver initializing Apr 12 20:53:11.579341 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 20:53:11.579346 kernel: intel_pstate: HWP enabled Apr 12 20:53:11.579351 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 20:53:11.579357 kernel: vesafb: scrolling: redraw Apr 12 20:53:11.579363 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 20:53:11.579369 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000c489e4c5, using 768k, total 768k Apr 12 20:53:11.579374 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 20:53:11.579380 kernel: fb0: VESA VGA frame buffer device Apr 12 20:53:11.579385 kernel: NET: Registered PF_INET6 protocol family Apr 12 20:53:11.579390 kernel: Segment Routing with IPv6 Apr 12 20:53:11.579395 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 20:53:11.579401 kernel: NET: Registered PF_PACKET protocol family Apr 12 20:53:11.579406 kernel: Key type dns_resolver registered Apr 12 20:53:11.579412 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 20:53:11.579418 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 20:53:11.579423 kernel: IPI shorthand broadcast: enabled Apr 12 20:53:11.579428 kernel: sched_clock: Marking stable (1681954885, 1334960460)->(4459870790, -1442955445) Apr 12 20:53:11.579434 kernel: registered taskstats version 1 Apr 12 20:53:11.579439 kernel: Loading compiled-in X.509 certificates Apr 12 20:53:11.579444 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 20:53:11.579449 kernel: Key type .fscrypt registered Apr 12 20:53:11.579455 kernel: Key type fscrypt-provisioning registered Apr 12 20:53:11.579461 kernel: pstore: Using crash dump compression: deflate Apr 12 20:53:11.579466 kernel: ima: Allocated hash algorithm: sha1 Apr 12 20:53:11.579472 kernel: ima: No architecture policies found Apr 12 20:53:11.579477 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 20:53:11.579483 kernel: Write protecting the kernel read-only data: 28672k Apr 12 20:53:11.579488 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 20:53:11.579494 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 20:53:11.579499 kernel: Run /init as init process Apr 12 20:53:11.579504 kernel: with arguments: Apr 12 20:53:11.579511 kernel: /init Apr 12 20:53:11.579516 kernel: with environment: Apr 12 20:53:11.579521 kernel: HOME=/ Apr 12 20:53:11.579526 kernel: TERM=linux Apr 12 20:53:11.579531 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 20:53:11.579538 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:53:11.579545 systemd[1]: Detected architecture x86-64. Apr 12 20:53:11.579552 systemd[1]: Running in initrd. Apr 12 20:53:11.579557 systemd[1]: No hostname configured, using default hostname. Apr 12 20:53:11.579563 systemd[1]: Hostname set to . Apr 12 20:53:11.579568 systemd[1]: Initializing machine ID from random generator. Apr 12 20:53:11.579574 systemd[1]: Queued start job for default target initrd.target. Apr 12 20:53:11.579579 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:53:11.579585 systemd[1]: Reached target cryptsetup.target. Apr 12 20:53:11.579591 systemd[1]: Reached target ignition-diskful-subsequent.target. Apr 12 20:53:11.579597 systemd[1]: Reached target paths.target. Apr 12 20:53:11.579602 systemd[1]: Reached target slices.target. Apr 12 20:53:11.579608 systemd[1]: Reached target swap.target. Apr 12 20:53:11.579613 systemd[1]: Reached target timers.target. Apr 12 20:53:11.579619 systemd[1]: Listening on iscsid.socket. Apr 12 20:53:11.579625 systemd[1]: Listening on iscsiuio.socket. Apr 12 20:53:11.579630 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 20:53:11.579636 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 20:53:11.579642 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Apr 12 20:53:11.579648 systemd[1]: Listening on systemd-journald.socket. Apr 12 20:53:11.579653 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Apr 12 20:53:11.579659 kernel: clocksource: Switched to clocksource tsc Apr 12 20:53:11.579664 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:53:11.579670 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:53:11.579675 systemd[1]: Reached target sockets.target. Apr 12 20:53:11.579681 systemd[1]: Starting iscsiuio.service... Apr 12 20:53:11.579686 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:53:11.579692 kernel: SCSI subsystem initialized Apr 12 20:53:11.579698 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 20:53:11.579703 kernel: Loading iSCSI transport class v2.0-870. Apr 12 20:53:11.579709 systemd[1]: Starting systemd-journald.service... Apr 12 20:53:11.579714 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:53:11.579722 systemd-journald[267]: Journal started Apr 12 20:53:11.579749 systemd-journald[267]: Runtime Journal (/run/log/journal/7f54afdd7c0c4e87948203cc223b04c6) is 8.0M, max 640.1M, 632.1M free. Apr 12 20:53:11.581977 systemd-modules-load[268]: Inserted module 'overlay' Apr 12 20:53:11.605571 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 20:53:11.641275 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 20:53:11.641293 systemd[1]: Started iscsiuio.service. Apr 12 20:53:11.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.666302 kernel: Bridge firewalling registered Apr 12 20:53:11.666318 kernel: audit: type=1130 audit(1712955191.664:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.666328 systemd[1]: Started systemd-journald.service. Apr 12 20:53:11.727069 systemd-modules-load[268]: Inserted module 'br_netfilter' Apr 12 20:53:11.770127 kernel: audit: type=1130 audit(1712955191.725:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.727356 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:53:11.882353 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 20:53:11.882365 kernel: audit: type=1130 audit(1712955191.789:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.882375 kernel: device-mapper: uevent: version 1.0.3 Apr 12 20:53:11.882382 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 20:53:11.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.790390 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 20:53:11.939446 kernel: audit: type=1130 audit(1712955191.894:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.889202 systemd-modules-load[268]: Inserted module 'dm_multipath' Apr 12 20:53:11.993636 kernel: audit: type=1130 audit(1712955191.947:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.895522 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:53:12.048686 kernel: audit: type=1130 audit(1712955192.001:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:11.948558 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 20:53:12.002853 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 20:53:12.049081 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:53:12.049383 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:53:12.052156 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:53:12.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.052521 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:53:12.102458 kernel: audit: type=1130 audit(1712955192.050:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.114599 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 20:53:12.222273 kernel: audit: type=1130 audit(1712955192.113:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.222308 kernel: audit: type=1130 audit(1712955192.171:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.172854 systemd[1]: Starting dracut-cmdline.service... Apr 12 20:53:12.240340 dracut-cmdline[291]: dracut-dracut-053 Apr 12 20:53:12.240340 dracut-cmdline[291]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 20:53:12.240340 dracut-cmdline[291]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:53:12.324495 kernel: iscsi: registered transport (tcp) Apr 12 20:53:12.324521 kernel: iscsi: registered transport (qla4xxx) Apr 12 20:53:12.324538 kernel: QLogic iSCSI HBA Driver Apr 12 20:53:12.320555 systemd[1]: Finished dracut-cmdline.service. Apr 12 20:53:12.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.335030 systemd[1]: Starting dracut-pre-udev.service... Apr 12 20:53:12.349719 systemd[1]: Starting iscsid.service... Apr 12 20:53:12.364402 systemd[1]: Started iscsid.service. Apr 12 20:53:12.400343 kernel: raid6: avx2x4 gen() 48981 MB/s Apr 12 20:53:12.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.400413 iscsid[451]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:53:12.400413 iscsid[451]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 20:53:12.400413 iscsid[451]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 20:53:12.400413 iscsid[451]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 20:53:12.400413 iscsid[451]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 20:53:12.400413 iscsid[451]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:53:12.400413 iscsid[451]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 20:53:12.566365 kernel: raid6: avx2x4 xor() 21492 MB/s Apr 12 20:53:12.566378 kernel: raid6: avx2x2 gen() 53856 MB/s Apr 12 20:53:12.566385 kernel: raid6: avx2x2 xor() 31965 MB/s Apr 12 20:53:12.566391 kernel: raid6: avx2x1 gen() 44519 MB/s Apr 12 20:53:12.566398 kernel: raid6: avx2x1 xor() 27416 MB/s Apr 12 20:53:12.610299 kernel: raid6: sse2x4 gen() 20827 MB/s Apr 12 20:53:12.645273 kernel: raid6: sse2x4 xor() 11500 MB/s Apr 12 20:53:12.680303 kernel: raid6: sse2x2 gen() 21128 MB/s Apr 12 20:53:12.715273 kernel: raid6: sse2x2 xor() 13361 MB/s Apr 12 20:53:12.749262 kernel: raid6: sse2x1 gen() 18292 MB/s Apr 12 20:53:12.801088 kernel: raid6: sse2x1 xor() 8916 MB/s Apr 12 20:53:12.801103 kernel: raid6: using algorithm avx2x2 gen() 53856 MB/s Apr 12 20:53:12.801111 kernel: raid6: .... xor() 31965 MB/s, rmw enabled Apr 12 20:53:12.819570 kernel: raid6: using avx2x2 recovery algorithm Apr 12 20:53:12.866293 kernel: xor: automatically using best checksumming function avx Apr 12 20:53:12.945247 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 20:53:12.950553 systemd[1]: Finished dracut-pre-udev.service. Apr 12 20:53:12.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.959000 audit: BPF prog-id=6 op=LOAD Apr 12 20:53:12.959000 audit: BPF prog-id=7 op=LOAD Apr 12 20:53:12.961197 systemd[1]: Starting systemd-udevd.service... Apr 12 20:53:12.969353 systemd-udevd[470]: Using default interface naming scheme 'v252'. Apr 12 20:53:12.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:12.974381 systemd[1]: Started systemd-udevd.service. Apr 12 20:53:13.017356 dracut-pre-trigger[481]: rd.md=0: removing MD RAID activation Apr 12 20:53:12.991895 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 20:53:13.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:13.022431 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 20:53:13.034506 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:53:13.087768 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:53:13.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:13.088593 systemd[1]: Starting dracut-initqueue.service... Apr 12 20:53:13.116245 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 20:53:13.144239 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 20:53:13.144276 kernel: AES CTR mode by8 optimization enabled Apr 12 20:53:13.163240 kernel: ACPI: bus type USB registered Apr 12 20:53:13.163276 kernel: usbcore: registered new interface driver usbfs Apr 12 20:53:13.163288 kernel: usbcore: registered new interface driver hub Apr 12 20:53:13.163300 kernel: usbcore: registered new device driver usb Apr 12 20:53:13.235238 kernel: libata version 3.00 loaded. Apr 12 20:53:13.270187 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 20:53:13.270214 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 20:53:13.306601 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:53:13.306687 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Apr 12 20:53:13.306744 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 20:53:13.306795 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:53:13.311286 kernel: pps pps0: new PPS source ptp0 Apr 12 20:53:13.311364 kernel: igb 0000:03:00.0: added PHC on eth0 Apr 12 20:53:13.311426 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:53:13.311478 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:40:f2 Apr 12 20:53:13.311528 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Apr 12 20:53:13.311578 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:53:13.345235 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 20:53:13.360282 kernel: pps pps1: new PPS source ptp1 Apr 12 20:53:13.360358 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 20:53:13.360431 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:53:13.360483 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 20:53:13.360534 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 20:53:13.360582 kernel: hub 1-0:1.0: USB hub found Apr 12 20:53:13.360646 kernel: hub 1-0:1.0: 16 ports detected Apr 12 20:53:13.361263 kernel: hub 2-0:1.0: USB hub found Apr 12 20:53:13.361346 kernel: hub 2-0:1.0: 10 ports detected Apr 12 20:53:13.392240 kernel: igb 0000:04:00.0: added PHC on eth1 Apr 12 20:53:13.424496 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Apr 12 20:53:13.424566 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:53:13.424622 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 20:53:13.441655 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:40:f3 Apr 12 20:53:13.460294 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Apr 12 20:53:13.503738 kernel: scsi host0: ahci Apr 12 20:53:13.503824 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:53:13.519192 kernel: scsi host1: ahci Apr 12 20:53:13.553729 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Apr 12 20:53:13.553803 kernel: scsi host2: ahci Apr 12 20:53:13.606235 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:53:13.610297 kernel: scsi host3: ahci Apr 12 20:53:13.610321 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 20:53:13.745272 kernel: hub 1-14:1.0: USB hub found Apr 12 20:53:13.745354 kernel: scsi host4: ahci Apr 12 20:53:13.773925 kernel: hub 1-14:1.0: 4 ports detected Apr 12 20:53:13.778284 kernel: scsi host5: ahci Apr 12 20:53:13.778308 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Apr 12 20:53:13.826277 kernel: scsi host6: ahci Apr 12 20:53:13.854871 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 138 Apr 12 20:53:13.854889 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 138 Apr 12 20:53:13.871571 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 138 Apr 12 20:53:13.888160 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 138 Apr 12 20:53:13.904604 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 138 Apr 12 20:53:13.921060 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 138 Apr 12 20:53:13.937465 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 138 Apr 12 20:53:13.975235 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:53:14.083272 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 20:53:14.195238 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:53:14.195358 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 20:53:14.210260 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Apr 12 20:53:14.243843 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:53:14.277242 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:53:14.277276 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 20:53:14.291264 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 20:53:14.306271 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:53:14.321232 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 20:53:14.335238 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 20:53:14.350233 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 20:53:14.364269 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Apr 12 20:53:14.379267 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Apr 12 20:53:14.425642 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:53:14.425658 kernel: ata2.00: Features: NCQ-prio Apr 12 20:53:14.425665 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:53:14.453497 kernel: ata1.00: Features: NCQ-prio Apr 12 20:53:14.471298 kernel: ata2.00: configured for UDMA/133 Apr 12 20:53:14.471315 kernel: ata1.00: configured for UDMA/133 Apr 12 20:53:14.484296 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Apr 12 20:53:14.501271 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Apr 12 20:53:14.552988 kernel: usbcore: registered new interface driver usbhid Apr 12 20:53:14.553026 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:53:14.553113 kernel: usbhid: USB HID core driver Apr 12 20:53:14.566280 kernel: port_module: 9 callbacks suppressed Apr 12 20:53:14.566298 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Apr 12 20:53:14.626283 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 20:53:14.626299 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:53:14.656968 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:53:14.656984 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:53:14.678295 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:53:14.678377 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:53:14.678442 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 20:53:14.678512 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 20:53:14.678520 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 20:53:14.702982 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 20:53:14.703058 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 20:53:14.703116 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 20:53:14.703175 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 20:53:14.732894 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 20:53:14.732971 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:53:14.764035 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 20:53:14.827051 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:53:14.827068 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:53:14.827137 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:53:14.828286 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:53:14.828303 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 20:53:14.967250 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:53:15.002235 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Apr 12 20:53:15.017758 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:53:15.033238 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 20:53:15.053274 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Apr 12 20:53:15.062781 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 20:53:15.102972 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sdb6 scanned by (udev-worker) (533) Apr 12 20:53:15.102987 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Apr 12 20:53:15.081360 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 20:53:15.126457 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 20:53:15.147445 systemd[1]: Finished dracut-initqueue.service. Apr 12 20:53:15.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.167635 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:53:15.219453 kernel: audit: type=1130 audit(1712955195.155:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.210576 systemd[1]: Reached target initrd-root-device.target. Apr 12 20:53:15.235469 systemd[1]: Reached target remote-fs-pre.target. Apr 12 20:53:15.243314 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:53:15.243353 systemd[1]: Reached target remote-fs.target. Apr 12 20:53:15.266129 systemd[1]: Starting disk-uuid.service... Apr 12 20:53:15.282363 systemd[1]: Starting dracut-pre-mount.service... Apr 12 20:53:15.301621 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 20:53:15.408006 kernel: audit: type=1130 audit(1712955195.316:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.408022 kernel: audit: type=1131 audit(1712955195.316:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.301670 systemd[1]: Finished disk-uuid.service. Apr 12 20:53:15.472507 kernel: audit: type=1130 audit(1712955195.415:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.317578 systemd[1]: Finished dracut-pre-mount.service. Apr 12 20:53:15.416524 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:53:15.481492 systemd[1]: Reached target local-fs.target. Apr 12 20:53:15.496492 systemd[1]: Reached target sysinit.target. Apr 12 20:53:15.496530 systemd[1]: Reached target basic.target. Apr 12 20:53:15.519120 systemd[1]: Starting systemd-fsck-root.service... Apr 12 20:53:15.526137 systemd[1]: Starting verity-setup.service... Apr 12 20:53:15.539429 systemd-fsck[708]: ROOT: clean, 641/553520 files, 110558/553472 blocks Apr 12 20:53:15.569243 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 20:53:15.572998 systemd[1]: Finished systemd-fsck-root.service. Apr 12 20:53:15.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.574052 systemd[1]: Mounting sysroot.mount... Apr 12 20:53:15.637341 kernel: audit: type=1130 audit(1712955195.571:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.631740 systemd[1]: Found device dev-mapper-usr.device. Apr 12 20:53:15.645433 systemd[1]: Finished verity-setup.service. Apr 12 20:53:15.758357 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 20:53:15.758372 kernel: audit: type=1130 audit(1712955195.670:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.758380 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 20:53:15.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.671733 systemd[1]: Mounting sysusr-usr.mount... Apr 12 20:53:15.769796 systemd[1]: Mounted sysroot.mount. Apr 12 20:53:15.784495 systemd[1]: Mounted sysusr-usr.mount. Apr 12 20:53:15.805462 systemd[1]: Reached target initrd-root-fs.target. Apr 12 20:53:15.814199 systemd[1]: Mounting sysroot-usr.mount... Apr 12 20:53:15.823209 systemd[1]: Mounted sysroot-usr.mount. Apr 12 20:53:15.845063 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:53:15.856972 systemd[1]: Starting initrd-setup-root.service... Apr 12 20:53:15.970518 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:53:15.970532 kernel: BTRFS info (device sdb6): using free space tree Apr 12 20:53:15.970540 kernel: BTRFS info (device sdb6): has skinny extents Apr 12 20:53:15.970546 kernel: BTRFS info (device sdb6): enabling ssd optimizations Apr 12 20:53:15.961059 systemd[1]: Finished initrd-setup-root.service. Apr 12 20:53:15.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:15.981550 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:53:16.047487 kernel: audit: type=1130 audit(1712955195.979:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.039936 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 20:53:16.056634 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 20:53:16.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.129429 initrd-setup-root-after-ignition[804]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 20:53:16.152468 kernel: audit: type=1130 audit(1712955196.075:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.097937 systemd[1]: Reached target ignition-subsequent.target. Apr 12 20:53:16.138836 systemd[1]: Starting initrd-parse-etc.service... Apr 12 20:53:16.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.157421 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 20:53:16.251511 kernel: audit: type=1130 audit(1712955196.174:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.157461 systemd[1]: Finished initrd-parse-etc.service. Apr 12 20:53:16.175496 systemd[1]: Reached target initrd-fs.target. Apr 12 20:53:16.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.237489 systemd[1]: Reached target initrd.target. Apr 12 20:53:16.237549 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 20:53:16.237890 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 20:53:16.258616 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 20:53:16.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.274877 systemd[1]: Starting initrd-cleanup.service... Apr 12 20:53:16.293382 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 20:53:16.305566 systemd[1]: Stopped target timers.target. Apr 12 20:53:16.324683 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 20:53:16.324931 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 20:53:16.343175 systemd[1]: Stopped target initrd.target. Apr 12 20:53:16.356786 systemd[1]: Stopped target basic.target. Apr 12 20:53:16.370905 systemd[1]: Stopped target ignition-subsequent.target. Apr 12 20:53:16.388901 systemd[1]: Stopped target ignition-diskful-subsequent.target. Apr 12 20:53:16.405806 systemd[1]: Stopped target initrd-root-device.target. Apr 12 20:53:16.423818 systemd[1]: Stopped target paths.target. Apr 12 20:53:16.437796 systemd[1]: Stopped target remote-fs.target. Apr 12 20:53:16.452786 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 20:53:16.467786 systemd[1]: Stopped target slices.target. Apr 12 20:53:16.483793 systemd[1]: Stopped target sockets.target. Apr 12 20:53:16.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.500791 systemd[1]: Stopped target sysinit.target. Apr 12 20:53:16.516817 systemd[1]: Stopped target local-fs.target. Apr 12 20:53:16.531787 systemd[1]: Stopped target local-fs-pre.target. Apr 12 20:53:16.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.548785 systemd[1]: Stopped target swap.target. Apr 12 20:53:16.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.564729 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 20:53:16.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.669488 iscsid[451]: iscsid shutting down. Apr 12 20:53:16.565112 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 20:53:16.580009 systemd[1]: Stopped target cryptsetup.target. Apr 12 20:53:16.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.594680 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 20:53:16.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.599466 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 20:53:16.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.610650 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 20:53:16.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.610978 systemd[1]: Stopped dracut-initqueue.service. Apr 12 20:53:16.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.626939 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 20:53:16.627345 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 20:53:16.644895 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 20:53:16.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.645264 systemd[1]: Stopped initrd-setup-root.service. Apr 12 20:53:16.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.661345 systemd[1]: Stopping iscsid.service... Apr 12 20:53:16.676412 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 20:53:16.676487 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 20:53:16.698561 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 20:53:16.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.698663 systemd[1]: Stopped systemd-sysctl.service. Apr 12 20:53:16.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.713679 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 20:53:16.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.713818 systemd[1]: Stopped systemd-modules-load.service. Apr 12 20:53:16.732821 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 20:53:16.733120 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 20:53:16.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.749935 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 20:53:16.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.750310 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 20:53:17.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:17.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.769477 systemd[1]: Stopping systemd-udevd.service... Apr 12 20:53:17.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:17.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:16.783812 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 20:53:16.784238 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 20:53:16.784287 systemd[1]: Stopped iscsid.service. Apr 12 20:53:16.807716 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 20:53:16.807801 systemd[1]: Stopped systemd-udevd.service. Apr 12 20:53:16.826817 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 20:53:16.826897 systemd[1]: Closed iscsid.socket. Apr 12 20:53:16.839480 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 20:53:16.839556 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 20:53:16.854601 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 20:53:16.854712 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 20:53:16.872493 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 20:53:16.872621 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 20:53:16.887588 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 20:53:16.887713 systemd[1]: Stopped dracut-cmdline.service. Apr 12 20:53:16.903585 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 20:53:16.903702 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 20:53:16.920284 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 20:53:16.937617 systemd[1]: Stopping iscsiuio.service... Apr 12 20:53:16.952439 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 20:53:16.952573 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 20:53:16.972625 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 20:53:16.972856 systemd[1]: Stopped iscsiuio.service. Apr 12 20:53:16.989267 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 20:53:17.124260 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Apr 12 20:53:16.989501 systemd[1]: Finished initrd-cleanup.service. Apr 12 20:53:17.007139 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 20:53:17.007372 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 20:53:17.023728 systemd[1]: Reached target initrd-switch-root.target. Apr 12 20:53:17.037519 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 20:53:17.037620 systemd[1]: Closed iscsiuio.socket. Apr 12 20:53:17.057998 systemd[1]: Starting initrd-switch-root.service... Apr 12 20:53:17.083222 systemd[1]: Switching root. Apr 12 20:53:17.124552 systemd-journald[267]: Journal stopped Apr 12 20:53:21.073561 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 20:53:21.073574 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 20:53:21.073582 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 20:53:21.073588 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 20:53:21.073593 kernel: SELinux: policy capability open_perms=1 Apr 12 20:53:21.073598 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 20:53:21.073604 kernel: SELinux: policy capability always_check_network=0 Apr 12 20:53:21.073609 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 20:53:21.073614 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 20:53:21.073620 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 20:53:21.073626 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 20:53:21.073632 systemd[1]: Successfully loaded SELinux policy in 286.495ms. Apr 12 20:53:21.073638 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.992ms. Apr 12 20:53:21.073645 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:53:21.073653 systemd[1]: Detected architecture x86-64. Apr 12 20:53:21.073660 systemd[1]: Detected first boot. Apr 12 20:53:21.073666 systemd[1]: Hostname set to . Apr 12 20:53:21.073683 systemd[1]: Initializing machine ID from random generator. Apr 12 20:53:21.073689 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 20:53:21.073695 systemd[1]: Populated /etc with preset unit settings. Apr 12 20:53:21.073701 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:53:21.073708 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:53:21.073715 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:53:21.073721 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 20:53:21.073727 systemd[1]: Stopped initrd-switch-root.service. Apr 12 20:53:21.073732 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 20:53:21.073739 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 20:53:21.073746 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 20:53:21.073752 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 20:53:21.073758 systemd[1]: Created slice system-getty.slice. Apr 12 20:53:21.073765 systemd[1]: Created slice system-modprobe.slice. Apr 12 20:53:21.073771 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 20:53:21.073777 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 20:53:21.073783 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 20:53:21.073788 systemd[1]: Created slice user.slice. Apr 12 20:53:21.073794 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:53:21.073801 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 20:53:21.073807 systemd[1]: Set up automount boot.automount. Apr 12 20:53:21.073813 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 20:53:21.073819 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 20:53:21.073827 systemd[1]: Stopped target initrd-fs.target. Apr 12 20:53:21.073833 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 20:53:21.073839 systemd[1]: Reached target integritysetup.target. Apr 12 20:53:21.073846 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:53:21.073852 systemd[1]: Reached target remote-fs.target. Apr 12 20:53:21.073859 systemd[1]: Reached target slices.target. Apr 12 20:53:21.073865 systemd[1]: Reached target swap.target. Apr 12 20:53:21.073871 systemd[1]: Reached target torcx.target. Apr 12 20:53:21.073887 systemd[1]: Reached target veritysetup.target. Apr 12 20:53:21.073893 systemd[1]: Listening on systemd-coredump.socket. Apr 12 20:53:21.073900 systemd[1]: Listening on systemd-initctl.socket. Apr 12 20:53:21.073906 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:53:21.073913 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:53:21.073920 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:53:21.073926 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 20:53:21.073932 systemd[1]: Mounting dev-hugepages.mount... Apr 12 20:53:21.073939 systemd[1]: Mounting dev-mqueue.mount... Apr 12 20:53:21.073945 systemd[1]: Mounting media.mount... Apr 12 20:53:21.073952 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:53:21.073959 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 20:53:21.073965 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 20:53:21.073971 systemd[1]: Mounting tmp.mount... Apr 12 20:53:21.073977 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 20:53:21.073984 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 20:53:21.073990 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:53:21.073996 systemd[1]: Starting modprobe@configfs.service... Apr 12 20:53:21.074003 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 20:53:21.074010 systemd[1]: Starting modprobe@drm.service... Apr 12 20:53:21.074016 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 20:53:21.074023 systemd[1]: Starting modprobe@fuse.service... Apr 12 20:53:21.074029 kernel: fuse: init (API version 7.34) Apr 12 20:53:21.074035 systemd[1]: Starting modprobe@loop.service... Apr 12 20:53:21.074042 kernel: loop: module loaded Apr 12 20:53:21.074048 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 20:53:21.074054 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 20:53:21.074062 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 20:53:21.074068 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 20:53:21.074074 kernel: kauditd_printk_skb: 62 callbacks suppressed Apr 12 20:53:21.074080 kernel: audit: type=1131 audit(1712955200.714:83): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.074086 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 20:53:21.074093 kernel: audit: type=1131 audit(1712955200.802:84): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.074099 systemd[1]: Stopped systemd-journald.service. Apr 12 20:53:21.074105 kernel: audit: type=1130 audit(1712955200.866:85): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.074112 kernel: audit: type=1131 audit(1712955200.866:86): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.074118 kernel: audit: type=1334 audit(1712955200.951:87): prog-id=19 op=LOAD Apr 12 20:53:21.074123 kernel: audit: type=1334 audit(1712955200.970:88): prog-id=20 op=LOAD Apr 12 20:53:21.074129 kernel: audit: type=1334 audit(1712955200.988:89): prog-id=21 op=LOAD Apr 12 20:53:21.074135 kernel: audit: type=1334 audit(1712955201.006:90): prog-id=17 op=UNLOAD Apr 12 20:53:21.074140 systemd[1]: Starting systemd-journald.service... Apr 12 20:53:21.074147 kernel: audit: type=1334 audit(1712955201.006:91): prog-id=18 op=UNLOAD Apr 12 20:53:21.074152 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:53:21.074160 kernel: audit: type=1305 audit(1712955201.069:92): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:53:21.074168 systemd-journald[945]: Journal started Apr 12 20:53:21.074193 systemd-journald[945]: Runtime Journal (/run/log/journal/b3c9bdc0e5b74407ba264785245b6872) is 8.0M, max 640.1M, 632.1M free. Apr 12 20:53:17.585000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 20:53:17.842000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:53:17.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:53:17.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:53:17.844000 audit: BPF prog-id=8 op=LOAD Apr 12 20:53:17.844000 audit: BPF prog-id=8 op=UNLOAD Apr 12 20:53:17.844000 audit: BPF prog-id=9 op=LOAD Apr 12 20:53:17.844000 audit: BPF prog-id=9 op=UNLOAD Apr 12 20:53:17.914000 audit[836]: AVC avc: denied { associate } for pid=836 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 20:53:17.914000 audit[836]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=819 pid=836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:17.914000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:53:17.940000 audit[836]: AVC avc: denied { associate } for pid=836 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 20:53:17.940000 audit[836]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=819 pid=836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:17.940000 audit: CWD cwd="/" Apr 12 20:53:17.940000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:17.940000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:17.940000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:53:19.462000 audit: BPF prog-id=10 op=LOAD Apr 12 20:53:19.462000 audit: BPF prog-id=3 op=UNLOAD Apr 12 20:53:19.462000 audit: BPF prog-id=11 op=LOAD Apr 12 20:53:19.462000 audit: BPF prog-id=12 op=LOAD Apr 12 20:53:19.462000 audit: BPF prog-id=4 op=UNLOAD Apr 12 20:53:19.462000 audit: BPF prog-id=5 op=UNLOAD Apr 12 20:53:19.463000 audit: BPF prog-id=13 op=LOAD Apr 12 20:53:19.463000 audit: BPF prog-id=10 op=UNLOAD Apr 12 20:53:19.463000 audit: BPF prog-id=14 op=LOAD Apr 12 20:53:19.463000 audit: BPF prog-id=15 op=LOAD Apr 12 20:53:19.463000 audit: BPF prog-id=11 op=UNLOAD Apr 12 20:53:19.463000 audit: BPF prog-id=12 op=UNLOAD Apr 12 20:53:19.464000 audit: BPF prog-id=16 op=LOAD Apr 12 20:53:19.464000 audit: BPF prog-id=13 op=UNLOAD Apr 12 20:53:19.464000 audit: BPF prog-id=17 op=LOAD Apr 12 20:53:19.464000 audit: BPF prog-id=18 op=LOAD Apr 12 20:53:19.464000 audit: BPF prog-id=14 op=UNLOAD Apr 12 20:53:19.464000 audit: BPF prog-id=15 op=UNLOAD Apr 12 20:53:19.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:19.512000 audit: BPF prog-id=16 op=UNLOAD Apr 12 20:53:19.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:19.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:20.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:20.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:20.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:20.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:20.951000 audit: BPF prog-id=19 op=LOAD Apr 12 20:53:20.970000 audit: BPF prog-id=20 op=LOAD Apr 12 20:53:20.988000 audit: BPF prog-id=21 op=LOAD Apr 12 20:53:21.006000 audit: BPF prog-id=17 op=UNLOAD Apr 12 20:53:21.006000 audit: BPF prog-id=18 op=UNLOAD Apr 12 20:53:21.069000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:53:17.913715 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:53:19.462261 systemd[1]: Queued start job for default target multi-user.target. Apr 12 20:53:17.914129 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:53:19.462267 systemd[1]: Unnecessary job was removed for dev-sdb6.device. Apr 12 20:53:17.914145 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:53:19.466184 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 20:53:17.914164 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 20:53:17.914170 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 20:53:17.914187 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 20:53:17.914194 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 20:53:17.914316 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 20:53:17.914338 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:53:17.914345 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:53:17.915464 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 20:53:17.915485 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 20:53:17.915496 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 20:53:17.915504 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 20:53:17.915513 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 20:53:17.915521 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 20:53:19.112878 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:53:19.113019 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:53:19.113077 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:53:19.113172 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:53:19.113202 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 20:53:19.113241 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-04-12T20:53:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 20:53:21.069000 audit[945]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff8bb2e810 a2=4000 a3=7fff8bb2e8ac items=0 ppid=1 pid=945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:21.069000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 20:53:21.151445 systemd[1]: Starting systemd-network-generator.service... Apr 12 20:53:21.178281 systemd[1]: Starting systemd-remount-fs.service... Apr 12 20:53:21.205289 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:53:21.248101 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 20:53:21.248123 systemd[1]: Stopped verity-setup.service. Apr 12 20:53:21.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.312634 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:53:21.312653 systemd[1]: Started systemd-journald.service. Apr 12 20:53:21.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.321775 systemd[1]: Mounted dev-hugepages.mount. Apr 12 20:53:21.329500 systemd[1]: Mounted dev-mqueue.mount. Apr 12 20:53:21.336491 systemd[1]: Mounted media.mount. Apr 12 20:53:21.343506 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 20:53:21.352509 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 20:53:21.361486 systemd[1]: Mounted tmp.mount. Apr 12 20:53:21.368584 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 20:53:21.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.377624 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:53:21.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.386728 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 20:53:21.386847 systemd[1]: Finished modprobe@configfs.service. Apr 12 20:53:21.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.395695 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 20:53:21.395833 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 20:53:21.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.404815 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 20:53:21.405006 systemd[1]: Finished modprobe@drm.service. Apr 12 20:53:21.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.413928 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 20:53:21.414168 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 20:53:21.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.423167 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 20:53:21.423694 systemd[1]: Finished modprobe@fuse.service. Apr 12 20:53:21.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.433165 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 20:53:21.433522 systemd[1]: Finished modprobe@loop.service. Apr 12 20:53:21.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.443157 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:53:21.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.452264 systemd[1]: Finished systemd-network-generator.service. Apr 12 20:53:21.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.461108 systemd[1]: Finished systemd-remount-fs.service. Apr 12 20:53:21.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.470114 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:53:21.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.479866 systemd[1]: Reached target network-pre.target. Apr 12 20:53:21.491480 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 20:53:21.502166 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 20:53:21.509510 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 20:53:21.513008 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 20:53:21.522974 systemd[1]: Starting systemd-journal-flush.service... Apr 12 20:53:21.531569 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 20:53:21.532416 systemd[1]: Starting systemd-random-seed.service... Apr 12 20:53:21.532787 systemd-journald[945]: Time spent on flushing to /var/log/journal/b3c9bdc0e5b74407ba264785245b6872 is 12ms for 1278 entries. Apr 12 20:53:21.532787 systemd-journald[945]: System Journal (/var/log/journal/b3c9bdc0e5b74407ba264785245b6872) is 8.0M, max 195.6M, 187.6M free. Apr 12 20:53:21.577336 systemd-journald[945]: Received client request to flush runtime journal. Apr 12 20:53:21.547364 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 20:53:21.547825 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:53:21.563403 systemd[1]: Starting systemd-sysusers.service... Apr 12 20:53:21.570782 systemd[1]: Starting systemd-udev-settle.service... Apr 12 20:53:21.578650 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 20:53:21.587412 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 20:53:21.595444 systemd[1]: Finished systemd-journal-flush.service. Apr 12 20:53:21.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.603451 systemd[1]: Finished systemd-random-seed.service. Apr 12 20:53:21.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.611456 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:53:21.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.619442 systemd[1]: Finished systemd-sysusers.service. Apr 12 20:53:21.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.628459 systemd[1]: Reached target first-boot-complete.target. Apr 12 20:53:21.636551 udevadm[961]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 20:53:21.843656 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 20:53:21.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.852000 audit: BPF prog-id=22 op=LOAD Apr 12 20:53:21.852000 audit: BPF prog-id=23 op=LOAD Apr 12 20:53:21.852000 audit: BPF prog-id=6 op=UNLOAD Apr 12 20:53:21.852000 audit: BPF prog-id=7 op=UNLOAD Apr 12 20:53:21.854499 systemd[1]: Starting systemd-udevd.service... Apr 12 20:53:21.865927 systemd-udevd[962]: Using default interface naming scheme 'v252'. Apr 12 20:53:21.883542 systemd[1]: Started systemd-udevd.service. Apr 12 20:53:21.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:21.893336 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 20:53:21.892000 audit: BPF prog-id=24 op=LOAD Apr 12 20:53:21.894626 systemd[1]: Starting systemd-networkd.service... Apr 12 20:53:21.938183 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 20:53:21.938337 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 20:53:21.938355 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 20:53:21.936000 audit: BPF prog-id=25 op=LOAD Apr 12 20:53:21.957000 audit: BPF prog-id=26 op=LOAD Apr 12 20:53:21.958000 audit: BPF prog-id=27 op=LOAD Apr 12 20:53:21.959772 systemd[1]: Starting systemd-userdbd.service... Apr 12 20:53:21.979248 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 20:53:22.000396 kernel: ACPI: button: Power Button [PWRF] Apr 12 20:53:21.919000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:53:21.919000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5588604c52b0 a1=4d8bc a2=7f4c4378abc5 a3=5 items=42 ppid=962 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:21.919000 audit: CWD cwd="/" Apr 12 20:53:21.919000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=1 name=(null) inode=26159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=2 name=(null) inode=26159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=3 name=(null) inode=26160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=4 name=(null) inode=26159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=5 name=(null) inode=26161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=6 name=(null) inode=26159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=7 name=(null) inode=26162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=8 name=(null) inode=26162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=9 name=(null) inode=26163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=10 name=(null) inode=26162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=11 name=(null) inode=26164 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=12 name=(null) inode=26162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=13 name=(null) inode=26165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=14 name=(null) inode=26162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=15 name=(null) inode=26166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=16 name=(null) inode=26162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=17 name=(null) inode=26167 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=18 name=(null) inode=26159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=19 name=(null) inode=26168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=20 name=(null) inode=26168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=21 name=(null) inode=26169 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=22 name=(null) inode=26168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=23 name=(null) inode=26170 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=24 name=(null) inode=26168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=25 name=(null) inode=26171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=26 name=(null) inode=26168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=27 name=(null) inode=26172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=28 name=(null) inode=26168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=29 name=(null) inode=26173 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=30 name=(null) inode=26159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=31 name=(null) inode=26174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=32 name=(null) inode=26174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=33 name=(null) inode=26175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=34 name=(null) inode=26174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=35 name=(null) inode=26176 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=36 name=(null) inode=26174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=37 name=(null) inode=26177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=38 name=(null) inode=26174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=39 name=(null) inode=26178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=40 name=(null) inode=26174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PATH item=41 name=(null) inode=26179 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:21.919000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 20:53:22.014242 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 20:53:22.014439 kernel: IPMI message handler: version 39.2 Apr 12 20:53:22.014464 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 20:53:22.039862 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:53:22.070239 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 20:53:22.111488 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 20:53:22.133236 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 20:53:22.140292 systemd[1]: Started systemd-userdbd.service. Apr 12 20:53:22.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.166237 kernel: ipmi device interface Apr 12 20:53:22.187235 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 20:53:22.187265 kernel: ipmi_si: IPMI System Interface driver Apr 12 20:53:22.225047 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 20:53:22.225148 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 20:53:22.245597 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 20:53:22.264740 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 20:53:22.305166 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 20:53:22.348480 systemd-networkd[1008]: bond0: netdev ready Apr 12 20:53:22.349683 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 20:53:22.349807 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 20:53:22.349824 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 20:53:22.350915 systemd-networkd[1008]: lo: Link UP Apr 12 20:53:22.350918 systemd-networkd[1008]: lo: Gained carrier Apr 12 20:53:22.351261 systemd-networkd[1008]: Enumeration completed Apr 12 20:53:22.351317 systemd[1]: Started systemd-networkd.service. Apr 12 20:53:22.351597 systemd-networkd[1008]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 20:53:22.354035 systemd-networkd[1008]: enp1s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d7:82:9b.network. Apr 12 20:53:22.373234 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Apr 12 20:53:22.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.413707 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Apr 12 20:53:22.467572 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 20:53:22.467675 kernel: intel_rapl_common: Found RAPL domain package Apr 12 20:53:22.484236 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Apr 12 20:53:22.484336 kernel: intel_rapl_common: Found RAPL domain core Apr 12 20:53:22.484350 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 20:53:22.610288 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 20:53:22.628246 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 20:53:22.632489 systemd[1]: Finished systemd-udev-settle.service. Apr 12 20:53:22.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.642051 systemd[1]: Starting lvm2-activation-early.service... Apr 12 20:53:22.657789 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:53:22.690612 systemd[1]: Finished lvm2-activation-early.service. Apr 12 20:53:22.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.699359 systemd[1]: Reached target cryptsetup.target. Apr 12 20:53:22.707890 systemd[1]: Starting lvm2-activation.service... Apr 12 20:53:22.710030 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:53:22.761711 systemd[1]: Finished lvm2-activation.service. Apr 12 20:53:22.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.770371 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:53:22.778321 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 20:53:22.778335 systemd[1]: Reached target local-fs.target. Apr 12 20:53:22.786331 systemd[1]: Reached target machines.target. Apr 12 20:53:22.794950 systemd[1]: Starting ldconfig.service... Apr 12 20:53:22.801777 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 20:53:22.801837 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:53:22.802432 systemd[1]: Starting systemd-boot-update.service... Apr 12 20:53:22.811014 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 20:53:22.820911 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 20:53:22.821034 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:53:22.821057 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:53:22.821684 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 20:53:22.821956 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1068 (bootctl) Apr 12 20:53:22.822739 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 20:53:22.835112 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 20:53:22.835439 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 20:53:22.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.835585 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 20:53:22.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.836878 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 20:53:22.842956 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 20:53:22.851445 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 20:53:22.894655 systemd-fsck[1076]: fsck.fat 4.2 (2021-01-31) Apr 12 20:53:22.894655 systemd-fsck[1076]: /dev/sdb1: 789 files, 119240/258078 clusters Apr 12 20:53:22.895470 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 20:53:22.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.907039 systemd[1]: Mounting boot.mount... Apr 12 20:53:22.927930 systemd[1]: Mounted boot.mount. Apr 12 20:53:22.946428 systemd[1]: Finished systemd-boot-update.service. Apr 12 20:53:22.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:22.978505 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 20:53:22.995233 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 20:53:23.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:23.012072 systemd[1]: Starting audit-rules.service... Apr 12 20:53:23.021008 systemd-networkd[1008]: enp1s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d7:82:9a.network. Apr 12 20:53:23.021234 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Apr 12 20:53:23.027917 systemd[1]: Starting clean-ca-certificates.service... Apr 12 20:53:23.030000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 20:53:23.030000 audit[1099]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff20cb8ec0 a2=420 a3=0 items=0 ppid=1083 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:23.030000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 20:53:23.031974 augenrules[1099]: No rules Apr 12 20:53:23.036872 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 20:53:23.046383 systemd[1]: Starting systemd-resolved.service... Apr 12 20:53:23.054461 systemd[1]: Starting systemd-timesyncd.service... Apr 12 20:53:23.062023 systemd[1]: Starting systemd-update-utmp.service... Apr 12 20:53:23.068563 systemd[1]: Finished audit-rules.service. Apr 12 20:53:23.075440 systemd[1]: Finished clean-ca-certificates.service. Apr 12 20:53:23.083429 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 20:53:23.091752 ldconfig[1067]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 20:53:23.102461 systemd[1]: Finished ldconfig.service. Apr 12 20:53:23.109313 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:53:23.124914 systemd[1]: Finished systemd-update-utmp.service. Apr 12 20:53:23.136828 systemd[1]: Starting systemd-update-done.service... Apr 12 20:53:23.143468 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 20:53:23.149936 systemd[1]: Finished systemd-update-done.service. Apr 12 20:53:23.184232 systemd[1]: Started systemd-timesyncd.service. Apr 12 20:53:23.187056 systemd-resolved[1105]: Positive Trust Anchors: Apr 12 20:53:23.187063 systemd-resolved[1105]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:53:23.187082 systemd-resolved[1105]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:53:23.197361 systemd[1]: Reached target time-set.target. Apr 12 20:53:23.203299 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Apr 12 20:53:23.206791 systemd-resolved[1105]: Using system hostname 'ci-3510.3.3-a-672e0e0c9d'. Apr 12 20:53:23.228281 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Apr 12 20:53:23.228306 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:53:23.249306 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 20:53:23.268819 systemd-networkd[1008]: bond0: Link UP Apr 12 20:53:23.269016 systemd-networkd[1008]: enp1s0f1np1: Link UP Apr 12 20:53:23.269178 systemd-networkd[1008]: enp1s0f0np0: Link UP Apr 12 20:53:23.269312 systemd-networkd[1008]: enp1s0f1np1: Gained carrier Apr 12 20:53:23.269548 systemd[1]: Started systemd-resolved.service. Apr 12 20:53:23.270289 systemd-networkd[1008]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d7:82:9a.network. Apr 12 20:53:23.286362 systemd[1]: Reached target network.target. Apr 12 20:53:23.294286 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:53:23.294330 kernel: bond0: active interface up! Apr 12 20:53:23.326337 systemd[1]: Reached target nss-lookup.target. Apr 12 20:53:23.330279 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 20:53:23.338336 systemd[1]: Reached target sysinit.target. Apr 12 20:53:23.346370 systemd[1]: Started motdgen.path. Apr 12 20:53:23.360328 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 20:53:23.373293 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:53:23.382401 systemd[1]: Started logrotate.timer. Apr 12 20:53:23.389359 systemd[1]: Started mdadm.timer. Apr 12 20:53:23.396321 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 20:53:23.404312 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 20:53:23.404330 systemd[1]: Reached target paths.target. Apr 12 20:53:23.411316 systemd[1]: Reached target timers.target. Apr 12 20:53:23.418862 systemd[1]: Listening on dbus.socket. Apr 12 20:53:23.425901 systemd[1]: Starting docker.socket... Apr 12 20:53:23.426327 systemd-networkd[1008]: bond0: Gained carrier Apr 12 20:53:23.426415 systemd-networkd[1008]: enp1s0f0np0: Gained carrier Apr 12 20:53:23.426461 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.432435 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.432568 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.432618 systemd-networkd[1008]: enp1s0f1np1: Link DOWN Apr 12 20:53:23.432620 systemd-networkd[1008]: enp1s0f1np1: Lost carrier Apr 12 20:53:23.442431 systemd[1]: Listening on sshd.socket. Apr 12 20:53:23.454296 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:53:23.454348 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Apr 12 20:53:23.478393 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:53:23.478789 systemd[1]: Listening on docker.socket. Apr 12 20:53:23.481414 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.481453 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.481529 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.485397 systemd[1]: Reached target sockets.target. Apr 12 20:53:23.493334 systemd[1]: Reached target basic.target. Apr 12 20:53:23.500350 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:53:23.500364 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:53:23.500842 systemd[1]: Starting containerd.service... Apr 12 20:53:23.507769 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 20:53:23.516787 systemd[1]: Starting coreos-metadata.service... Apr 12 20:53:23.523787 systemd[1]: Starting dbus.service... Apr 12 20:53:23.529776 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 20:53:23.534884 jq[1118]: false Apr 12 20:53:23.536810 systemd[1]: Starting extend-filesystems.service... Apr 12 20:53:23.543283 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 20:53:23.543551 dbus-daemon[1117]: [system] SELinux support is enabled Apr 12 20:53:23.543880 systemd[1]: Starting motdgen.service... Apr 12 20:53:23.544010 extend-filesystems[1121]: Found sda Apr 12 20:53:23.544010 extend-filesystems[1121]: Found sdb Apr 12 20:53:23.589315 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Apr 12 20:53:23.551972 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 20:53:23.589377 coreos-metadata[1114]: Apr 12 20:53:23.563 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:53:23.589493 coreos-metadata[1113]: Apr 12 20:53:23.563 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:53:23.589591 extend-filesystems[1121]: Found sdb1 Apr 12 20:53:23.589591 extend-filesystems[1121]: Found sdb2 Apr 12 20:53:23.589591 extend-filesystems[1121]: Found sdb3 Apr 12 20:53:23.589591 extend-filesystems[1121]: Found usr Apr 12 20:53:23.589591 extend-filesystems[1121]: Found sdb4 Apr 12 20:53:23.589591 extend-filesystems[1121]: Found sdb6 Apr 12 20:53:23.589591 extend-filesystems[1121]: Found sdb7 Apr 12 20:53:23.589591 extend-filesystems[1121]: Found sdb9 Apr 12 20:53:23.589591 extend-filesystems[1121]: Checking size of /dev/sdb9 Apr 12 20:53:23.589591 extend-filesystems[1121]: Resized partition /dev/sdb9 Apr 12 20:53:23.743337 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 20:53:23.743444 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Apr 12 20:53:23.743459 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Apr 12 20:53:23.743470 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:53:23.584361 systemd[1]: Starting prepare-critools.service... Apr 12 20:53:23.743579 extend-filesystems[1135]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 20:53:23.596862 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 20:53:23.622778 systemd[1]: Starting sshd-keygen.service... Apr 12 20:53:23.653486 systemd-networkd[1008]: enp1s0f1np1: Link UP Apr 12 20:53:23.653664 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.653708 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.653709 systemd-networkd[1008]: enp1s0f1np1: Gained carrier Apr 12 20:53:23.759715 jq[1152]: true Apr 12 20:53:23.665398 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.665509 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:23.683815 systemd[1]: Starting systemd-logind.service... Apr 12 20:53:23.715287 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:53:23.715813 systemd[1]: Starting tcsd.service... Apr 12 20:53:23.724362 systemd-logind[1149]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 20:53:23.724373 systemd-logind[1149]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 20:53:23.724385 systemd-logind[1149]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 20:53:23.724534 systemd-logind[1149]: New seat seat0. Apr 12 20:53:23.735566 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 20:53:23.735927 systemd[1]: Starting update-engine.service... Apr 12 20:53:23.750948 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 20:53:23.767614 systemd[1]: Started dbus.service. Apr 12 20:53:23.776062 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 20:53:23.776147 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 20:53:23.776320 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 20:53:23.776396 systemd[1]: Finished motdgen.service. Apr 12 20:53:23.780559 update_engine[1151]: I0412 20:53:23.780026 1151 main.cc:92] Flatcar Update Engine starting Apr 12 20:53:23.783676 update_engine[1151]: I0412 20:53:23.783643 1151 update_check_scheduler.cc:74] Next update check in 8m40s Apr 12 20:53:23.784054 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 20:53:23.784133 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 20:53:23.790985 tar[1154]: ./ Apr 12 20:53:23.790985 tar[1154]: ./loopback Apr 12 20:53:23.795454 dbus-daemon[1117]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 20:53:23.795688 jq[1158]: false Apr 12 20:53:23.796100 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Apr 12 20:53:23.796185 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Apr 12 20:53:23.796395 tar[1155]: crictl Apr 12 20:53:23.802110 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 20:53:23.802212 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 20:53:23.802305 systemd[1]: Started update-engine.service. Apr 12 20:53:23.803859 env[1159]: time="2024-04-12T20:53:23.803833691Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 20:53:23.812334 systemd[1]: Started systemd-logind.service. Apr 12 20:53:23.812433 env[1159]: time="2024-04-12T20:53:23.812416957Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 20:53:23.812512 env[1159]: time="2024-04-12T20:53:23.812502971Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813151 env[1159]: time="2024-04-12T20:53:23.813127135Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813151 env[1159]: time="2024-04-12T20:53:23.813149700Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813311 env[1159]: time="2024-04-12T20:53:23.813265111Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813311 env[1159]: time="2024-04-12T20:53:23.813282585Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813311 env[1159]: time="2024-04-12T20:53:23.813290389Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 20:53:23.813311 env[1159]: time="2024-04-12T20:53:23.813295677Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813403 env[1159]: time="2024-04-12T20:53:23.813335436Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813504 env[1159]: time="2024-04-12T20:53:23.813468611Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813578 env[1159]: time="2024-04-12T20:53:23.813541095Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:53:23.813578 env[1159]: time="2024-04-12T20:53:23.813550885Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 20:53:23.813621 env[1159]: time="2024-04-12T20:53:23.813577741Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 20:53:23.813621 env[1159]: time="2024-04-12T20:53:23.813585090Z" level=info msg="metadata content store policy set" policy=shared Apr 12 20:53:23.813732 tar[1154]: ./bandwidth Apr 12 20:53:23.822482 systemd[1]: Started locksmithd.service. Apr 12 20:53:23.830385 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 20:53:23.830467 systemd[1]: Reached target system-config.target. Apr 12 20:53:23.839335 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 20:53:23.839449 systemd[1]: Reached target user-config.target. Apr 12 20:53:23.845837 env[1159]: time="2024-04-12T20:53:23.845790887Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 20:53:23.845837 env[1159]: time="2024-04-12T20:53:23.845812489Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 20:53:23.845837 env[1159]: time="2024-04-12T20:53:23.845820688Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845840970Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845849329Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845857218Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845864464Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845877417Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845890660Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845901062Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.845909 env[1159]: time="2024-04-12T20:53:23.845908247Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.846042 env[1159]: time="2024-04-12T20:53:23.845929815Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 20:53:23.846042 env[1159]: time="2024-04-12T20:53:23.845990331Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 20:53:23.846075 env[1159]: time="2024-04-12T20:53:23.846047485Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 20:53:23.846204 env[1159]: time="2024-04-12T20:53:23.846195802Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 20:53:23.846226 env[1159]: time="2024-04-12T20:53:23.846212546Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846226 env[1159]: time="2024-04-12T20:53:23.846222477Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 20:53:23.846267 env[1159]: time="2024-04-12T20:53:23.846257338Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846285 env[1159]: time="2024-04-12T20:53:23.846270896Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846303 env[1159]: time="2024-04-12T20:53:23.846284354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846303 env[1159]: time="2024-04-12T20:53:23.846295795Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846342 env[1159]: time="2024-04-12T20:53:23.846303151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846342 env[1159]: time="2024-04-12T20:53:23.846309895Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846342 env[1159]: time="2024-04-12T20:53:23.846316797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846342 env[1159]: time="2024-04-12T20:53:23.846322902Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846342 env[1159]: time="2024-04-12T20:53:23.846330116Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 20:53:23.846428 env[1159]: time="2024-04-12T20:53:23.846394000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846428 env[1159]: time="2024-04-12T20:53:23.846403285Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846428 env[1159]: time="2024-04-12T20:53:23.846410012Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846428 env[1159]: time="2024-04-12T20:53:23.846416519Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 20:53:23.846493 env[1159]: time="2024-04-12T20:53:23.846429412Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 20:53:23.846493 env[1159]: time="2024-04-12T20:53:23.846441209Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 20:53:23.846493 env[1159]: time="2024-04-12T20:53:23.846455188Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 20:53:23.846493 env[1159]: time="2024-04-12T20:53:23.846478482Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 20:53:23.846642 env[1159]: time="2024-04-12T20:53:23.846591116Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 20:53:23.846642 env[1159]: time="2024-04-12T20:53:23.846625657Z" level=info msg="Connect containerd service" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.846645189Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.846935213Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847035602Z" level=info msg="Start subscribing containerd event" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847066699Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847084058Z" level=info msg="Start recovering state" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847091938Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847118563Z" level=info msg="containerd successfully booted in 0.043666s" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847131232Z" level=info msg="Start event monitor" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847141212Z" level=info msg="Start snapshots syncer" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847149528Z" level=info msg="Start cni network conf syncer for default" Apr 12 20:53:23.849844 env[1159]: time="2024-04-12T20:53:23.847172939Z" level=info msg="Start streaming server" Apr 12 20:53:23.850056 systemd[1]: Started containerd.service. Apr 12 20:53:23.860973 tar[1154]: ./ptp Apr 12 20:53:23.892994 tar[1154]: ./vlan Apr 12 20:53:23.901987 locksmithd[1178]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 20:53:23.919861 tar[1154]: ./host-device Apr 12 20:53:23.945157 tar[1154]: ./tuning Apr 12 20:53:23.967653 tar[1154]: ./vrf Apr 12 20:53:23.992313 tar[1154]: ./sbr Apr 12 20:53:24.015669 tar[1154]: ./tap Apr 12 20:53:24.042636 tar[1154]: ./dhcp Apr 12 20:53:24.113982 tar[1154]: ./static Apr 12 20:53:24.118527 systemd[1]: Finished prepare-critools.service. Apr 12 20:53:24.133368 tar[1154]: ./firewall Apr 12 20:53:24.162642 tar[1154]: ./macvlan Apr 12 20:53:24.189437 tar[1154]: ./dummy Apr 12 20:53:24.216075 tar[1154]: ./bridge Apr 12 20:53:24.245033 tar[1154]: ./ipvlan Apr 12 20:53:24.271065 tar[1154]: ./portmap Apr 12 20:53:24.295990 tar[1154]: ./host-local Apr 12 20:53:24.321803 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 20:53:24.495393 systemd-networkd[1008]: bond0: Gained IPv6LL Apr 12 20:53:24.495712 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:24.815554 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:24.815729 systemd-timesyncd[1106]: Network configuration changed, trying to establish connection. Apr 12 20:53:24.865263 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Apr 12 20:53:24.893838 extend-filesystems[1135]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Apr 12 20:53:24.893838 extend-filesystems[1135]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 20:53:24.893838 extend-filesystems[1135]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Apr 12 20:53:24.934321 extend-filesystems[1121]: Resized filesystem in /dev/sdb9 Apr 12 20:53:24.894263 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 20:53:24.894344 systemd[1]: Finished extend-filesystems.service. Apr 12 20:53:25.094160 sshd_keygen[1148]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 20:53:25.106391 systemd[1]: Finished sshd-keygen.service. Apr 12 20:53:25.114304 systemd[1]: Starting issuegen.service... Apr 12 20:53:25.122550 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 20:53:25.122634 systemd[1]: Finished issuegen.service. Apr 12 20:53:25.130152 systemd[1]: Starting systemd-user-sessions.service... Apr 12 20:53:25.138548 systemd[1]: Finished systemd-user-sessions.service. Apr 12 20:53:25.148024 systemd[1]: Started getty@tty1.service. Apr 12 20:53:25.155974 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 20:53:25.164455 systemd[1]: Reached target getty.target. Apr 12 20:53:25.897468 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 20:53:29.744595 coreos-metadata[1114]: Apr 12 20:53:29.744 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:53:29.745428 coreos-metadata[1113]: Apr 12 20:53:29.744 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:53:30.209370 login[1206]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:53:30.210842 login[1207]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:53:30.221598 systemd[1]: Created slice user-500.slice. Apr 12 20:53:30.222331 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 20:53:30.223731 systemd-logind[1149]: New session 1 of user core. Apr 12 20:53:30.225811 systemd-logind[1149]: New session 2 of user core. Apr 12 20:53:30.228974 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 20:53:30.229878 systemd[1]: Starting user@500.service... Apr 12 20:53:30.232459 (systemd)[1211]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:30.348035 systemd[1211]: Queued start job for default target default.target. Apr 12 20:53:30.348274 systemd[1211]: Reached target paths.target. Apr 12 20:53:30.348286 systemd[1211]: Reached target sockets.target. Apr 12 20:53:30.348294 systemd[1211]: Reached target timers.target. Apr 12 20:53:30.348301 systemd[1211]: Reached target basic.target. Apr 12 20:53:30.348322 systemd[1211]: Reached target default.target. Apr 12 20:53:30.348336 systemd[1211]: Startup finished in 111ms. Apr 12 20:53:30.348383 systemd[1]: Started user@500.service. Apr 12 20:53:30.348934 systemd[1]: Started session-1.scope. Apr 12 20:53:30.349274 systemd[1]: Started session-2.scope. Apr 12 20:53:30.745105 coreos-metadata[1114]: Apr 12 20:53:30.744 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:53:30.746020 coreos-metadata[1113]: Apr 12 20:53:30.745 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:53:31.413653 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Apr 12 20:53:31.413809 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Apr 12 20:53:31.823087 coreos-metadata[1114]: Apr 12 20:53:31.823 INFO Fetch successful Apr 12 20:53:31.823427 coreos-metadata[1113]: Apr 12 20:53:31.823 INFO Fetch successful Apr 12 20:53:31.846927 systemd[1]: Finished coreos-metadata.service. Apr 12 20:53:31.847757 systemd[1]: Started packet-phone-home.service. Apr 12 20:53:31.848359 unknown[1113]: wrote ssh authorized keys file for user: core Apr 12 20:53:31.854017 curl[1233]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 20:53:31.854196 curl[1233]: Dload Upload Total Spent Left Speed Apr 12 20:53:31.881647 update-ssh-keys[1234]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:53:31.881915 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 20:53:31.882148 systemd[1]: Reached target multi-user.target. Apr 12 20:53:31.882881 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 20:53:31.887686 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 20:53:31.887787 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 20:53:31.887901 systemd[1]: Startup finished in 1.847s (kernel) + 6.449s (initrd) + 14.611s (userspace) = 22.908s. Apr 12 20:53:32.448587 curl[1233]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 20:53:32.451022 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 20:53:37.385703 systemd[1]: Created slice system-sshd.slice. Apr 12 20:53:37.386217 systemd[1]: Started sshd@0-139.178.88.131:22-43.163.245.219:40136.service. Apr 12 20:53:38.084483 sshd[1238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.245.219 user=root Apr 12 20:53:39.149056 systemd[1]: Started sshd@1-139.178.88.131:22-147.75.109.163:33426.service. Apr 12 20:53:39.184709 sshd[1241]: Accepted publickey for core from 147.75.109.163 port 33426 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:53:39.185887 sshd[1241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:39.189539 systemd-logind[1149]: New session 3 of user core. Apr 12 20:53:39.190431 systemd[1]: Started session-3.scope. Apr 12 20:53:39.246041 systemd[1]: Started sshd@2-139.178.88.131:22-147.75.109.163:33436.service. Apr 12 20:53:39.281071 sshd[1246]: Accepted publickey for core from 147.75.109.163 port 33436 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:53:39.281795 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:39.284157 systemd-logind[1149]: New session 4 of user core. Apr 12 20:53:39.284652 systemd[1]: Started session-4.scope. Apr 12 20:53:39.336086 sshd[1246]: pam_unix(sshd:session): session closed for user core Apr 12 20:53:39.337613 systemd[1]: sshd@2-139.178.88.131:22-147.75.109.163:33436.service: Deactivated successfully. Apr 12 20:53:39.337926 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 20:53:39.338194 systemd-logind[1149]: Session 4 logged out. Waiting for processes to exit. Apr 12 20:53:39.338702 systemd[1]: Started sshd@3-139.178.88.131:22-147.75.109.163:33450.service. Apr 12 20:53:39.339106 systemd-logind[1149]: Removed session 4. Apr 12 20:53:39.374656 sshd[1252]: Accepted publickey for core from 147.75.109.163 port 33450 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:53:39.375794 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:39.379954 systemd-logind[1149]: New session 5 of user core. Apr 12 20:53:39.380932 systemd[1]: Started session-5.scope. Apr 12 20:53:39.439181 sshd[1252]: pam_unix(sshd:session): session closed for user core Apr 12 20:53:39.445971 systemd[1]: sshd@3-139.178.88.131:22-147.75.109.163:33450.service: Deactivated successfully. Apr 12 20:53:39.447571 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 20:53:39.449301 systemd-logind[1149]: Session 5 logged out. Waiting for processes to exit. Apr 12 20:53:39.451896 systemd[1]: Started sshd@4-139.178.88.131:22-147.75.109.163:33466.service. Apr 12 20:53:39.454196 systemd-logind[1149]: Removed session 5. Apr 12 20:53:39.519020 sshd[1259]: Accepted publickey for core from 147.75.109.163 port 33466 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:53:39.521297 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:39.529187 systemd-logind[1149]: New session 6 of user core. Apr 12 20:53:39.531307 systemd[1]: Started session-6.scope. Apr 12 20:53:39.613017 sshd[1259]: pam_unix(sshd:session): session closed for user core Apr 12 20:53:39.619413 systemd[1]: sshd@4-139.178.88.131:22-147.75.109.163:33466.service: Deactivated successfully. Apr 12 20:53:39.620992 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 20:53:39.622767 systemd-logind[1149]: Session 6 logged out. Waiting for processes to exit. Apr 12 20:53:39.625269 systemd[1]: Started sshd@5-139.178.88.131:22-147.75.109.163:33472.service. Apr 12 20:53:39.627716 systemd-logind[1149]: Removed session 6. Apr 12 20:53:39.686746 sshd[1265]: Accepted publickey for core from 147.75.109.163 port 33472 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:53:39.688457 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:39.693938 systemd-logind[1149]: New session 7 of user core. Apr 12 20:53:39.695114 systemd[1]: Started session-7.scope. Apr 12 20:53:39.797316 sudo[1268]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 20:53:39.797946 sudo[1268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:53:39.818729 dbus-daemon[1117]: ЍP\x811V: received setenforce notice (enforcing=-1952133808) Apr 12 20:53:39.823554 sudo[1268]: pam_unix(sudo:session): session closed for user root Apr 12 20:53:39.828929 sshd[1265]: pam_unix(sshd:session): session closed for user core Apr 12 20:53:39.835924 systemd[1]: sshd@5-139.178.88.131:22-147.75.109.163:33472.service: Deactivated successfully. Apr 12 20:53:39.837588 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 20:53:39.839406 systemd-logind[1149]: Session 7 logged out. Waiting for processes to exit. Apr 12 20:53:39.842054 systemd[1]: Started sshd@6-139.178.88.131:22-147.75.109.163:33474.service. Apr 12 20:53:39.844371 systemd-logind[1149]: Removed session 7. Apr 12 20:53:39.872106 sshd[1238]: Failed password for root from 43.163.245.219 port 40136 ssh2 Apr 12 20:53:39.909314 sshd[1272]: Accepted publickey for core from 147.75.109.163 port 33474 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:53:39.911652 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:39.918974 systemd-logind[1149]: New session 8 of user core. Apr 12 20:53:39.920908 systemd[1]: Started session-8.scope. Apr 12 20:53:39.989829 sudo[1276]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 20:53:39.989938 sudo[1276]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:53:39.991639 sudo[1276]: pam_unix(sudo:session): session closed for user root Apr 12 20:53:39.993894 sudo[1275]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 20:53:39.994006 sudo[1275]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:53:39.999132 systemd[1]: Stopping audit-rules.service... Apr 12 20:53:39.998000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:53:40.000068 auditctl[1279]: No rules Apr 12 20:53:40.000235 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 20:53:40.000326 systemd[1]: Stopped audit-rules.service. Apr 12 20:53:40.001173 systemd[1]: Starting audit-rules.service... Apr 12 20:53:40.005384 kernel: kauditd_printk_skb: 95 callbacks suppressed Apr 12 20:53:40.005427 kernel: audit: type=1305 audit(1712955219.998:139): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:53:40.012069 augenrules[1296]: No rules Apr 12 20:53:40.012397 systemd[1]: Finished audit-rules.service. Apr 12 20:53:40.012928 sudo[1275]: pam_unix(sudo:session): session closed for user root Apr 12 20:53:40.013950 sshd[1272]: pam_unix(sshd:session): session closed for user core Apr 12 20:53:40.015681 systemd[1]: sshd@6-139.178.88.131:22-147.75.109.163:33474.service: Deactivated successfully. Apr 12 20:53:40.016102 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 20:53:40.016531 systemd-logind[1149]: Session 8 logged out. Waiting for processes to exit. Apr 12 20:53:40.017082 systemd-logind[1149]: Removed session 8. Apr 12 20:53:39.998000 audit[1279]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc18018f40 a2=420 a3=0 items=0 ppid=1 pid=1279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:40.051979 kernel: audit: type=1300 audit(1712955219.998:139): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc18018f40 a2=420 a3=0 items=0 ppid=1 pid=1279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:40.052004 kernel: audit: type=1327 audit(1712955219.998:139): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:53:39.998000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:53:40.053780 systemd[1]: Started sshd@7-139.178.88.131:22-147.75.109.163:33482.service. Apr 12 20:53:40.061548 kernel: audit: type=1131 audit(1712955219.999:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:39.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.083989 kernel: audit: type=1130 audit(1712955220.011:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.106445 kernel: audit: type=1106 audit(1712955220.011:142): pid=1275 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.011000 audit[1275]: USER_END pid=1275 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.132417 kernel: audit: type=1104 audit(1712955220.011:143): pid=1275 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.011000 audit[1275]: CRED_DISP pid=1275 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.155957 kernel: audit: type=1106 audit(1712955220.013:144): pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.013000 audit[1272]: USER_END pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.188164 kernel: audit: type=1104 audit(1712955220.013:145): pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.013000 audit[1272]: CRED_DISP pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.214136 kernel: audit: type=1131 audit(1712955220.014:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.88.131:22-147.75.109.163:33474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.88.131:22-147.75.109.163:33474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.222636 sshd[1302]: Accepted publickey for core from 147.75.109.163 port 33482 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:53:40.224618 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:53:40.226728 systemd-logind[1149]: New session 9 of user core. Apr 12 20:53:40.227159 systemd[1]: Started session-9.scope. Apr 12 20:53:40.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.88.131:22-147.75.109.163:33482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.221000 audit[1302]: USER_ACCT pid=1302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.223000 audit[1302]: CRED_ACQ pid=1302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.223000 audit[1302]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe05780fe0 a2=3 a3=0 items=0 ppid=1 pid=1302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:40.223000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:53:40.228000 audit[1302]: USER_START pid=1302 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.228000 audit[1304]: CRED_ACQ pid=1304 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:40.282000 audit[1305]: USER_ACCT pid=1305 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.284206 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 20:53:40.282000 audit[1305]: CRED_REFR pid=1305 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.284336 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:53:40.284000 audit[1305]: USER_START pid=1305 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.765722 systemd[1]: Reloading. Apr 12 20:53:40.783773 /usr/lib/systemd/system-generators/torcx-generator[1336]: time="2024-04-12T20:53:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:53:40.783794 /usr/lib/systemd/system-generators/torcx-generator[1336]: time="2024-04-12T20:53:40Z" level=info msg="torcx already run" Apr 12 20:53:40.834678 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:53:40.834685 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:53:40.845568 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.888000 audit: BPF prog-id=35 op=LOAD Apr 12 20:53:40.888000 audit: BPF prog-id=24 op=UNLOAD Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.889000 audit: BPF prog-id=36 op=LOAD Apr 12 20:53:40.889000 audit: BPF prog-id=29 op=UNLOAD Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit: BPF prog-id=37 op=LOAD Apr 12 20:53:40.890000 audit: BPF prog-id=28 op=UNLOAD Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit: BPF prog-id=38 op=LOAD Apr 12 20:53:40.891000 audit: BPF prog-id=19 op=UNLOAD Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit: BPF prog-id=39 op=LOAD Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit: BPF prog-id=40 op=LOAD Apr 12 20:53:40.891000 audit: BPF prog-id=20 op=UNLOAD Apr 12 20:53:40.891000 audit: BPF prog-id=21 op=UNLOAD Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.891000 audit: BPF prog-id=41 op=LOAD Apr 12 20:53:40.891000 audit: BPF prog-id=33 op=UNLOAD Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit: BPF prog-id=42 op=LOAD Apr 12 20:53:40.892000 audit: BPF prog-id=30 op=UNLOAD Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit: BPF prog-id=43 op=LOAD Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.892000 audit: BPF prog-id=44 op=LOAD Apr 12 20:53:40.892000 audit: BPF prog-id=31 op=UNLOAD Apr 12 20:53:40.892000 audit: BPF prog-id=32 op=UNLOAD Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit: BPF prog-id=45 op=LOAD Apr 12 20:53:40.893000 audit: BPF prog-id=25 op=UNLOAD Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit: BPF prog-id=46 op=LOAD Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit: BPF prog-id=47 op=LOAD Apr 12 20:53:40.893000 audit: BPF prog-id=26 op=UNLOAD Apr 12 20:53:40.893000 audit: BPF prog-id=27 op=UNLOAD Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit: BPF prog-id=48 op=LOAD Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:40.893000 audit: BPF prog-id=49 op=LOAD Apr 12 20:53:40.894000 audit: BPF prog-id=22 op=UNLOAD Apr 12 20:53:40.894000 audit: BPF prog-id=23 op=UNLOAD Apr 12 20:53:40.899846 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 20:53:40.903583 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 20:53:40.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:40.903965 systemd[1]: Reached target network-online.target. Apr 12 20:53:40.904644 systemd[1]: Started kubelet.service. Apr 12 20:53:40.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:41.133359 sshd[1238]: Received disconnect from 43.163.245.219 port 40136:11: Bye Bye [preauth] Apr 12 20:53:41.133359 sshd[1238]: Disconnected from authenticating user root 43.163.245.219 port 40136 [preauth] Apr 12 20:53:41.136023 systemd[1]: sshd@0-139.178.88.131:22-43.163.245.219:40136.service: Deactivated successfully. Apr 12 20:53:41.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@0-139.178.88.131:22-43.163.245.219:40136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:41.489880 kubelet[1393]: E0412 20:53:41.489599 1393 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 20:53:41.495093 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 20:53:41.495468 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 20:53:41.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 20:53:41.829063 systemd[1]: Stopped kubelet.service. Apr 12 20:53:41.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:41.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:41.838689 systemd[1]: Reloading. Apr 12 20:53:41.868652 /usr/lib/systemd/system-generators/torcx-generator[1503]: time="2024-04-12T20:53:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:53:41.868669 /usr/lib/systemd/system-generators/torcx-generator[1503]: time="2024-04-12T20:53:41Z" level=info msg="torcx already run" Apr 12 20:53:41.930125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:53:41.930136 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:53:41.945368 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.990000 audit: BPF prog-id=50 op=LOAD Apr 12 20:53:41.990000 audit: BPF prog-id=35 op=UNLOAD Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit: BPF prog-id=51 op=LOAD Apr 12 20:53:41.991000 audit: BPF prog-id=36 op=UNLOAD Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit: BPF prog-id=52 op=LOAD Apr 12 20:53:41.992000 audit: BPF prog-id=37 op=UNLOAD Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit: BPF prog-id=53 op=LOAD Apr 12 20:53:41.993000 audit: BPF prog-id=38 op=UNLOAD Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit: BPF prog-id=54 op=LOAD Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit: BPF prog-id=55 op=LOAD Apr 12 20:53:41.993000 audit: BPF prog-id=39 op=UNLOAD Apr 12 20:53:41.993000 audit: BPF prog-id=40 op=UNLOAD Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.993000 audit: BPF prog-id=56 op=LOAD Apr 12 20:53:41.993000 audit: BPF prog-id=41 op=UNLOAD Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit: BPF prog-id=57 op=LOAD Apr 12 20:53:41.994000 audit: BPF prog-id=42 op=UNLOAD Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit: BPF prog-id=58 op=LOAD Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.994000 audit: BPF prog-id=59 op=LOAD Apr 12 20:53:41.994000 audit: BPF prog-id=43 op=UNLOAD Apr 12 20:53:41.994000 audit: BPF prog-id=44 op=UNLOAD Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit: BPF prog-id=60 op=LOAD Apr 12 20:53:41.995000 audit: BPF prog-id=45 op=UNLOAD Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit: BPF prog-id=61 op=LOAD Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit: BPF prog-id=62 op=LOAD Apr 12 20:53:41.995000 audit: BPF prog-id=46 op=UNLOAD Apr 12 20:53:41.995000 audit: BPF prog-id=47 op=UNLOAD Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit: BPF prog-id=63 op=LOAD Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:41.996000 audit: BPF prog-id=64 op=LOAD Apr 12 20:53:41.996000 audit: BPF prog-id=48 op=UNLOAD Apr 12 20:53:41.996000 audit: BPF prog-id=49 op=UNLOAD Apr 12 20:53:42.003849 systemd[1]: Started kubelet.service. Apr 12 20:53:42.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:42.030711 kubelet[1560]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:53:42.030711 kubelet[1560]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 20:53:42.030711 kubelet[1560]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:53:42.030711 kubelet[1560]: I0412 20:53:42.030693 1560 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 20:53:42.277513 kubelet[1560]: I0412 20:53:42.277466 1560 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 20:53:42.277513 kubelet[1560]: I0412 20:53:42.277481 1560 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 20:53:42.278029 kubelet[1560]: I0412 20:53:42.278012 1560 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 20:53:42.290041 kubelet[1560]: I0412 20:53:42.289968 1560 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 20:53:42.329153 kubelet[1560]: I0412 20:53:42.329071 1560 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 20:53:42.330521 kubelet[1560]: I0412 20:53:42.330441 1560 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 20:53:42.330702 kubelet[1560]: I0412 20:53:42.330613 1560 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 20:53:42.330702 kubelet[1560]: I0412 20:53:42.330655 1560 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 20:53:42.330702 kubelet[1560]: I0412 20:53:42.330690 1560 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 20:53:42.331358 kubelet[1560]: I0412 20:53:42.331284 1560 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:53:42.343249 kubelet[1560]: I0412 20:53:42.343164 1560 kubelet.go:405] "Attempting to sync node with API server" Apr 12 20:53:42.343249 kubelet[1560]: I0412 20:53:42.343220 1560 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 20:53:42.343824 kubelet[1560]: I0412 20:53:42.343761 1560 kubelet.go:309] "Adding apiserver pod source" Apr 12 20:53:42.343824 kubelet[1560]: I0412 20:53:42.343812 1560 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 20:53:42.344052 kubelet[1560]: E0412 20:53:42.343859 1560 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:42.344052 kubelet[1560]: E0412 20:53:42.343967 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:42.347072 kubelet[1560]: I0412 20:53:42.347001 1560 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 20:53:42.349930 kubelet[1560]: W0412 20:53:42.349853 1560 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 20:53:42.351924 kubelet[1560]: I0412 20:53:42.351866 1560 server.go:1168] "Started kubelet" Apr 12 20:53:42.352108 kubelet[1560]: I0412 20:53:42.352071 1560 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 20:53:42.353122 kubelet[1560]: I0412 20:53:42.353082 1560 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 20:53:42.355981 kubelet[1560]: E0412 20:53:42.355795 1560 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 20:53:42.355981 kubelet[1560]: E0412 20:53:42.355970 1560 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 20:53:42.360968 kubelet[1560]: I0412 20:53:42.360911 1560 server.go:461] "Adding debug handlers to kubelet server" Apr 12 20:53:42.359000 audit[1560]: AVC avc: denied { mac_admin } for pid=1560 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:42.359000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:53:42.359000 audit[1560]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006aa120 a1=c00102a4c8 a2=c0006aa0f0 a3=25 items=0 ppid=1 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.359000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:53:42.359000 audit[1560]: AVC avc: denied { mac_admin } for pid=1560 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:42.359000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:53:42.359000 audit[1560]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bce340 a1=c00102a4e0 a2=c0006aa1b0 a3=25 items=0 ppid=1 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.359000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:53:42.362291 kubelet[1560]: I0412 20:53:42.361071 1560 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 20:53:42.362291 kubelet[1560]: I0412 20:53:42.361155 1560 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 20:53:42.362291 kubelet[1560]: I0412 20:53:42.361310 1560 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 20:53:42.362291 kubelet[1560]: I0412 20:53:42.361477 1560 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 20:53:42.362291 kubelet[1560]: I0412 20:53:42.361565 1560 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 20:53:42.365123 kubelet[1560]: E0412 20:53:42.365092 1560 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.3\" not found" node="10.67.80.3" Apr 12 20:53:42.393610 kubelet[1560]: I0412 20:53:42.393586 1560 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 20:53:42.393610 kubelet[1560]: I0412 20:53:42.393607 1560 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 20:53:42.393766 kubelet[1560]: I0412 20:53:42.393624 1560 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:53:42.394438 kubelet[1560]: I0412 20:53:42.394421 1560 policy_none.go:49] "None policy: Start" Apr 12 20:53:42.394962 kubelet[1560]: I0412 20:53:42.394948 1560 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 20:53:42.395007 kubelet[1560]: I0412 20:53:42.394972 1560 state_mem.go:35] "Initializing new in-memory state store" Apr 12 20:53:42.400400 systemd[1]: Created slice kubepods.slice. Apr 12 20:53:42.404008 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 20:53:42.406716 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 20:53:42.411000 audit[1585]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.411000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc33d3af50 a2=0 a3=7ffc33d3af3c items=0 ppid=1560 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 20:53:42.412000 audit[1590]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.412000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff35746970 a2=0 a3=7fff3574695c items=0 ppid=1560 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 20:53:42.430401 kubelet[1560]: I0412 20:53:42.430343 1560 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 20:53:42.429000 audit[1560]: AVC avc: denied { mac_admin } for pid=1560 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:42.429000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:53:42.429000 audit[1560]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb2330 a1=c000cb03f0 a2=c000cb22a0 a3=25 items=0 ppid=1 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.429000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:53:42.431358 kubelet[1560]: I0412 20:53:42.430500 1560 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 20:53:42.431358 kubelet[1560]: I0412 20:53:42.431215 1560 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 20:53:42.431873 kubelet[1560]: E0412 20:53:42.431832 1560 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.3\" not found" Apr 12 20:53:42.413000 audit[1592]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.413000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcd8fea1c0 a2=0 a3=7ffcd8fea1ac items=0 ppid=1560 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:53:42.463084 kubelet[1560]: I0412 20:53:42.462987 1560 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.3" Apr 12 20:53:42.465000 audit[1598]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1598 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.465000 audit[1598]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdbd3cf050 a2=0 a3=7ffdbd3cf03c items=0 ppid=1560 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:53:42.469658 kubelet[1560]: I0412 20:53:42.469604 1560 kubelet_node_status.go:73] "Successfully registered node" node="10.67.80.3" Apr 12 20:53:42.487902 kubelet[1560]: I0412 20:53:42.487822 1560 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 20:53:42.488602 env[1159]: time="2024-04-12T20:53:42.488469523Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 20:53:42.489335 kubelet[1560]: I0412 20:53:42.488929 1560 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 20:53:42.554000 audit[1603]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1603 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.554000 audit[1603]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca47996b0 a2=0 a3=7ffca479969c items=0 ppid=1560 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 20:53:42.555803 kubelet[1560]: I0412 20:53:42.555662 1560 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 20:53:42.554000 audit[1604]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1604 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:42.554000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1d00a6d0 a2=0 a3=7ffd1d00a6bc items=0 ppid=1560 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 20:53:42.555000 audit[1605]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.555000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe66102720 a2=0 a3=7ffe6610270c items=0 ppid=1560 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 20:53:42.556518 kubelet[1560]: I0412 20:53:42.556305 1560 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 20:53:42.556518 kubelet[1560]: I0412 20:53:42.556322 1560 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 20:53:42.556518 kubelet[1560]: I0412 20:53:42.556335 1560 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 20:53:42.556518 kubelet[1560]: E0412 20:53:42.556362 1560 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 20:53:42.555000 audit[1606]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1606 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:42.555000 audit[1606]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5f4ed4b0 a2=0 a3=7ffc5f4ed49c items=0 ppid=1560 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 20:53:42.555000 audit[1607]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.555000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff513b2300 a2=0 a3=7fff513b22ec items=0 ppid=1560 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 20:53:42.556000 audit[1608]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1608 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:42.556000 audit[1608]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe060978e0 a2=0 a3=7ffe060978cc items=0 ppid=1560 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 20:53:42.556000 audit[1609]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:42.556000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd98f36ce0 a2=0 a3=7ffd98f36ccc items=0 ppid=1560 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 20:53:42.556000 audit[1610]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:42.556000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd55f99320 a2=0 a3=7ffd55f9930c items=0 ppid=1560 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:42.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 20:53:43.279964 kubelet[1560]: I0412 20:53:43.279855 1560 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 20:53:43.280876 kubelet[1560]: W0412 20:53:43.280312 1560 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 20:53:43.280876 kubelet[1560]: W0412 20:53:43.280348 1560 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 20:53:43.280876 kubelet[1560]: W0412 20:53:43.280435 1560 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 20:53:43.344266 kubelet[1560]: I0412 20:53:43.344167 1560 apiserver.go:52] "Watching apiserver" Apr 12 20:53:43.344539 kubelet[1560]: E0412 20:53:43.344323 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:43.349051 kubelet[1560]: I0412 20:53:43.348968 1560 topology_manager.go:212] "Topology Admit Handler" Apr 12 20:53:43.349260 kubelet[1560]: I0412 20:53:43.349194 1560 topology_manager.go:212] "Topology Admit Handler" Apr 12 20:53:43.349410 kubelet[1560]: I0412 20:53:43.349335 1560 topology_manager.go:212] "Topology Admit Handler" Apr 12 20:53:43.349937 kubelet[1560]: E0412 20:53:43.349874 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wz7gr" podUID=f250c946-2324-4641-acec-9b43864ff141 Apr 12 20:53:43.358503 systemd[1]: Created slice kubepods-besteffort-poddb4a5caa_7a19_4aaf_bcfb_57e7bd99764c.slice. Apr 12 20:53:43.363534 kubelet[1560]: I0412 20:53:43.363499 1560 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 20:53:43.366814 kubelet[1560]: I0412 20:53:43.366777 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-xtables-lock\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.366814 kubelet[1560]: I0412 20:53:43.366796 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-policysync\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.366814 kubelet[1560]: I0412 20:53:43.366811 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f250c946-2324-4641-acec-9b43864ff141-registration-dir\") pod \"csi-node-driver-wz7gr\" (UID: \"f250c946-2324-4641-acec-9b43864ff141\") " pod="calico-system/csi-node-driver-wz7gr" Apr 12 20:53:43.366898 kubelet[1560]: I0412 20:53:43.366844 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/32104f9f-69a8-4bdb-bbec-39e745d9dcfc-xtables-lock\") pod \"kube-proxy-qv6mh\" (UID: \"32104f9f-69a8-4bdb-bbec-39e745d9dcfc\") " pod="kube-system/kube-proxy-qv6mh" Apr 12 20:53:43.366898 kubelet[1560]: I0412 20:53:43.366863 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/32104f9f-69a8-4bdb-bbec-39e745d9dcfc-lib-modules\") pod \"kube-proxy-qv6mh\" (UID: \"32104f9f-69a8-4bdb-bbec-39e745d9dcfc\") " pod="kube-system/kube-proxy-qv6mh" Apr 12 20:53:43.366898 kubelet[1560]: I0412 20:53:43.366884 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-node-certs\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.366952 kubelet[1560]: I0412 20:53:43.366902 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-var-run-calico\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.366952 kubelet[1560]: I0412 20:53:43.366918 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-cni-log-dir\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.366952 kubelet[1560]: I0412 20:53:43.366940 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f250c946-2324-4641-acec-9b43864ff141-varrun\") pod \"csi-node-driver-wz7gr\" (UID: \"f250c946-2324-4641-acec-9b43864ff141\") " pod="calico-system/csi-node-driver-wz7gr" Apr 12 20:53:43.367008 kubelet[1560]: I0412 20:53:43.366958 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f250c946-2324-4641-acec-9b43864ff141-socket-dir\") pod \"csi-node-driver-wz7gr\" (UID: \"f250c946-2324-4641-acec-9b43864ff141\") " pod="calico-system/csi-node-driver-wz7gr" Apr 12 20:53:43.367008 kubelet[1560]: I0412 20:53:43.366975 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-lib-modules\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.367008 kubelet[1560]: I0412 20:53:43.366993 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkjxw\" (UniqueName: \"kubernetes.io/projected/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-kube-api-access-lkjxw\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.367063 kubelet[1560]: I0412 20:53:43.367010 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lbswq\" (UniqueName: \"kubernetes.io/projected/f250c946-2324-4641-acec-9b43864ff141-kube-api-access-lbswq\") pod \"csi-node-driver-wz7gr\" (UID: \"f250c946-2324-4641-acec-9b43864ff141\") " pod="calico-system/csi-node-driver-wz7gr" Apr 12 20:53:43.367063 kubelet[1560]: I0412 20:53:43.367022 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/32104f9f-69a8-4bdb-bbec-39e745d9dcfc-kube-proxy\") pod \"kube-proxy-qv6mh\" (UID: \"32104f9f-69a8-4bdb-bbec-39e745d9dcfc\") " pod="kube-system/kube-proxy-qv6mh" Apr 12 20:53:43.367063 kubelet[1560]: I0412 20:53:43.367035 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-var-lib-calico\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.367118 kubelet[1560]: I0412 20:53:43.367060 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-cni-bin-dir\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.367118 kubelet[1560]: I0412 20:53:43.367088 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-cni-net-dir\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.367118 kubelet[1560]: I0412 20:53:43.367106 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-flexvol-driver-host\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.367118 kubelet[1560]: I0412 20:53:43.367118 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f250c946-2324-4641-acec-9b43864ff141-kubelet-dir\") pod \"csi-node-driver-wz7gr\" (UID: \"f250c946-2324-4641-acec-9b43864ff141\") " pod="calico-system/csi-node-driver-wz7gr" Apr 12 20:53:43.367190 kubelet[1560]: I0412 20:53:43.367131 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nt8b2\" (UniqueName: \"kubernetes.io/projected/32104f9f-69a8-4bdb-bbec-39e745d9dcfc-kube-api-access-nt8b2\") pod \"kube-proxy-qv6mh\" (UID: \"32104f9f-69a8-4bdb-bbec-39e745d9dcfc\") " pod="kube-system/kube-proxy-qv6mh" Apr 12 20:53:43.367190 kubelet[1560]: I0412 20:53:43.367149 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/db4a5caa-7a19-4aaf-bcfb-57e7bd99764c-tigera-ca-bundle\") pod \"calico-node-zvtrg\" (UID: \"db4a5caa-7a19-4aaf-bcfb-57e7bd99764c\") " pod="calico-system/calico-node-zvtrg" Apr 12 20:53:43.367190 kubelet[1560]: I0412 20:53:43.367168 1560 reconciler.go:41] "Reconciler: start to sync state" Apr 12 20:53:43.372155 systemd[1]: Created slice kubepods-besteffort-pod32104f9f_69a8_4bdb_bbec_39e745d9dcfc.slice. Apr 12 20:53:43.469437 kubelet[1560]: E0412 20:53:43.469330 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.469437 kubelet[1560]: W0412 20:53:43.469389 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.469783 kubelet[1560]: E0412 20:53:43.469482 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.470169 kubelet[1560]: E0412 20:53:43.470088 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.470169 kubelet[1560]: W0412 20:53:43.470127 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.470514 kubelet[1560]: E0412 20:53:43.470203 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.470853 kubelet[1560]: E0412 20:53:43.470772 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.470853 kubelet[1560]: W0412 20:53:43.470806 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.471134 kubelet[1560]: E0412 20:53:43.470911 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.471553 kubelet[1560]: E0412 20:53:43.471472 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.471553 kubelet[1560]: W0412 20:53:43.471505 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.471867 kubelet[1560]: E0412 20:53:43.471605 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.472183 kubelet[1560]: E0412 20:53:43.472123 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.472183 kubelet[1560]: W0412 20:53:43.472168 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.472414 kubelet[1560]: E0412 20:53:43.472333 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.472864 kubelet[1560]: E0412 20:53:43.472784 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.472864 kubelet[1560]: W0412 20:53:43.472823 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.473184 kubelet[1560]: E0412 20:53:43.472951 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.474064 kubelet[1560]: E0412 20:53:43.473982 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.474064 kubelet[1560]: W0412 20:53:43.474018 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.474064 kubelet[1560]: E0412 20:53:43.474060 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.475570 kubelet[1560]: E0412 20:53:43.475522 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.475570 kubelet[1560]: W0412 20:53:43.475528 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.475570 kubelet[1560]: E0412 20:53:43.475535 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.476133 kubelet[1560]: E0412 20:53:43.476125 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.476133 kubelet[1560]: W0412 20:53:43.476131 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.476191 kubelet[1560]: E0412 20:53:43.476138 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.476333 kubelet[1560]: E0412 20:53:43.476297 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.476333 kubelet[1560]: W0412 20:53:43.476304 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.476333 kubelet[1560]: E0412 20:53:43.476315 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.476550 kubelet[1560]: E0412 20:53:43.476510 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:43.476550 kubelet[1560]: W0412 20:53:43.476516 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:43.476550 kubelet[1560]: E0412 20:53:43.476523 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:43.523548 sudo[1305]: pam_unix(sudo:session): session closed for user root Apr 12 20:53:43.522000 audit[1305]: USER_END pid=1305 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:43.522000 audit[1305]: CRED_DISP pid=1305 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:53:43.525021 sshd[1302]: pam_unix(sshd:session): session closed for user core Apr 12 20:53:43.525000 audit[1302]: USER_END pid=1302 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:43.525000 audit[1302]: CRED_DISP pid=1302 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:53:43.527820 systemd[1]: sshd@7-139.178.88.131:22-147.75.109.163:33482.service: Deactivated successfully. Apr 12 20:53:43.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.88.131:22-147.75.109.163:33482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:43.528780 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 20:53:43.529715 systemd-logind[1149]: Session 9 logged out. Waiting for processes to exit. Apr 12 20:53:43.530869 systemd-logind[1149]: Removed session 9. Apr 12 20:53:43.673437 env[1159]: time="2024-04-12T20:53:43.673304255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zvtrg,Uid:db4a5caa-7a19-4aaf-bcfb-57e7bd99764c,Namespace:calico-system,Attempt:0,}" Apr 12 20:53:43.675669 env[1159]: time="2024-04-12T20:53:43.675536784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qv6mh,Uid:32104f9f-69a8-4bdb-bbec-39e745d9dcfc,Namespace:kube-system,Attempt:0,}" Apr 12 20:53:44.344554 kubelet[1560]: E0412 20:53:44.344445 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:44.369796 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3189609314.mount: Deactivated successfully. Apr 12 20:53:44.371918 env[1159]: time="2024-04-12T20:53:44.371899487Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.372382 env[1159]: time="2024-04-12T20:53:44.372369174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.372737 env[1159]: time="2024-04-12T20:53:44.372727032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.373233 env[1159]: time="2024-04-12T20:53:44.373217449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.374463 env[1159]: time="2024-04-12T20:53:44.374430074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.376011 env[1159]: time="2024-04-12T20:53:44.375989649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.376730 env[1159]: time="2024-04-12T20:53:44.376716243Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.377930 env[1159]: time="2024-04-12T20:53:44.377913686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:44.385011 env[1159]: time="2024-04-12T20:53:44.384955649Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:53:44.385011 env[1159]: time="2024-04-12T20:53:44.384976071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:53:44.385011 env[1159]: time="2024-04-12T20:53:44.384996319Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:53:44.385124 env[1159]: time="2024-04-12T20:53:44.385076057Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25893572c5cf17dc2198d0c37b7af06bd781fb72ba571ea1c96ca2eba5567115 pid=1639 runtime=io.containerd.runc.v2 Apr 12 20:53:44.385307 env[1159]: time="2024-04-12T20:53:44.385282140Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:53:44.385307 env[1159]: time="2024-04-12T20:53:44.385299813Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:53:44.385362 env[1159]: time="2024-04-12T20:53:44.385306534Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:53:44.385384 env[1159]: time="2024-04-12T20:53:44.385358161Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72 pid=1646 runtime=io.containerd.runc.v2 Apr 12 20:53:44.391807 systemd[1]: Started cri-containerd-25893572c5cf17dc2198d0c37b7af06bd781fb72ba571ea1c96ca2eba5567115.scope. Apr 12 20:53:44.392645 systemd[1]: Started cri-containerd-aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72.scope. Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit: BPF prog-id=65 op=LOAD Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1639 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383933353732633563663137646332313938643063333762376166 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1639 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383933353732633563663137646332313938643063333762376166 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit: BPF prog-id=66 op=LOAD Apr 12 20:53:44.396000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000271d90 items=0 ppid=1639 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383933353732633563663137646332313938643063333762376166 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit: BPF prog-id=67 op=LOAD Apr 12 20:53:44.396000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000271dd8 items=0 ppid=1639 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383933353732633563663137646332313938643063333762376166 Apr 12 20:53:44.396000 audit: BPF prog-id=67 op=UNLOAD Apr 12 20:53:44.396000 audit: BPF prog-id=66 op=UNLOAD Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { perfmon } for pid=1662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit[1662]: AVC avc: denied { bpf } for pid=1662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.396000 audit: BPF prog-id=68 op=LOAD Apr 12 20:53:44.396000 audit[1662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce1e8 items=0 ppid=1639 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383933353732633563663137646332313938643063333762376166 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit: BPF prog-id=69 op=LOAD Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1646 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663362303832623366376462666364663061643664633566343138 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1646 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663362303832623366376462666364663061643664633566343138 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit: BPF prog-id=70 op=LOAD Apr 12 20:53:44.397000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000259d80 items=0 ppid=1646 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663362303832623366376462666364663061643664633566343138 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit: BPF prog-id=71 op=LOAD Apr 12 20:53:44.397000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000259dc8 items=0 ppid=1646 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663362303832623366376462666364663061643664633566343138 Apr 12 20:53:44.397000 audit: BPF prog-id=71 op=UNLOAD Apr 12 20:53:44.397000 audit: BPF prog-id=70 op=UNLOAD Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:44.397000 audit: BPF prog-id=72 op=LOAD Apr 12 20:53:44.397000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b61d8 items=0 ppid=1646 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:44.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663362303832623366376462666364663061643664633566343138 Apr 12 20:53:44.403105 env[1159]: time="2024-04-12T20:53:44.403075912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qv6mh,Uid:32104f9f-69a8-4bdb-bbec-39e745d9dcfc,Namespace:kube-system,Attempt:0,} returns sandbox id \"25893572c5cf17dc2198d0c37b7af06bd781fb72ba571ea1c96ca2eba5567115\"" Apr 12 20:53:44.403588 env[1159]: time="2024-04-12T20:53:44.403572059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zvtrg,Uid:db4a5caa-7a19-4aaf-bcfb-57e7bd99764c,Namespace:calico-system,Attempt:0,} returns sandbox id \"aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72\"" Apr 12 20:53:44.404122 env[1159]: time="2024-04-12T20:53:44.404110585Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 20:53:45.301198 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2120224391.mount: Deactivated successfully. Apr 12 20:53:45.345089 kubelet[1560]: E0412 20:53:45.345075 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:45.556962 kubelet[1560]: E0412 20:53:45.556883 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wz7gr" podUID=f250c946-2324-4641-acec-9b43864ff141 Apr 12 20:53:45.638598 env[1159]: time="2024-04-12T20:53:45.638550456Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:45.639389 env[1159]: time="2024-04-12T20:53:45.639366216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:45.640534 env[1159]: time="2024-04-12T20:53:45.640521851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:45.641155 env[1159]: time="2024-04-12T20:53:45.641117310Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:45.641481 env[1159]: time="2024-04-12T20:53:45.641443853Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d\"" Apr 12 20:53:45.641989 env[1159]: time="2024-04-12T20:53:45.641947003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 20:53:45.642816 env[1159]: time="2024-04-12T20:53:45.642804051Z" level=info msg="CreateContainer within sandbox \"25893572c5cf17dc2198d0c37b7af06bd781fb72ba571ea1c96ca2eba5567115\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 20:53:45.648565 env[1159]: time="2024-04-12T20:53:45.648523427Z" level=info msg="CreateContainer within sandbox \"25893572c5cf17dc2198d0c37b7af06bd781fb72ba571ea1c96ca2eba5567115\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b71b734a96d6b9e6b02e709c83e887036f0bca52b1fe4c8d351882cffec97c33\"" Apr 12 20:53:45.649005 env[1159]: time="2024-04-12T20:53:45.648968555Z" level=info msg="StartContainer for \"b71b734a96d6b9e6b02e709c83e887036f0bca52b1fe4c8d351882cffec97c33\"" Apr 12 20:53:45.658103 systemd[1]: Started cri-containerd-b71b734a96d6b9e6b02e709c83e887036f0bca52b1fe4c8d351882cffec97c33.scope. Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.671559 kernel: kauditd_printk_skb: 529 callbacks suppressed Apr 12 20:53:45.671612 kernel: audit: type=1400 audit(1712955225.664:563): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb27d2931a8 items=0 ppid=1639 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:45.759050 kernel: audit: type=1300 audit(1712955225.664:563): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb27d2931a8 items=0 ppid=1639 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:45.759081 kernel: audit: type=1327 audit(1712955225.664:563): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316237333461393664366239653662303265373039633833653838 Apr 12 20:53:45.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316237333461393664366239653662303265373039633833653838 Apr 12 20:53:45.839364 kernel: audit: type=1400 audit(1712955225.664:564): avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.895455 kernel: audit: type=1400 audit(1712955225.664:564): avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:46.012352 kernel: audit: type=1400 audit(1712955225.664:564): avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:46.012376 kernel: audit: type=1400 audit(1712955225.664:564): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:46.073447 kernel: audit: type=1400 audit(1712955225.664:564): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:46.079020 env[1159]: time="2024-04-12T20:53:46.078968203Z" level=info msg="StartContainer for \"b71b734a96d6b9e6b02e709c83e887036f0bca52b1fe4c8d351882cffec97c33\" returns successfully" Apr 12 20:53:46.135713 kernel: audit: type=1400 audit(1712955225.664:564): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:46.198682 kernel: audit: type=1400 audit(1712955225.664:564): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.664000 audit: BPF prog-id=73 op=LOAD Apr 12 20:53:45.664000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000383c58 items=0 ppid=1639 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:45.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316237333461393664366239653662303265373039633833653838 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.757000 audit: BPF prog-id=74 op=LOAD Apr 12 20:53:45.757000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000383ca8 items=0 ppid=1639 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:45.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316237333461393664366239653662303265373039633833653838 Apr 12 20:53:45.894000 audit: BPF prog-id=74 op=UNLOAD Apr 12 20:53:45.894000 audit: BPF prog-id=73 op=UNLOAD Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:45.894000 audit: BPF prog-id=75 op=LOAD Apr 12 20:53:45.894000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000383d38 items=0 ppid=1639 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:45.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316237333461393664366239653662303265373039633833653838 Apr 12 20:53:46.113000 audit[1774]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.113000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdda819fe0 a2=0 a3=7ffdda819fcc items=0 ppid=1723 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 20:53:46.113000 audit[1775]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.113000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe078ec490 a2=0 a3=7ffe078ec47c items=0 ppid=1723 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 20:53:46.114000 audit[1776]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.114000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca9a009f0 a2=0 a3=7ffca9a009dc items=0 ppid=1723 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 20:53:46.114000 audit[1777]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.114000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff87917000 a2=0 a3=7fff87916fec items=0 ppid=1723 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 20:53:46.114000 audit[1778]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.114000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf9b74a30 a2=0 a3=7ffdf9b74a1c items=0 ppid=1723 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 20:53:46.114000 audit[1779]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.114000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7f423a40 a2=0 a3=7fff7f423a2c items=0 ppid=1723 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 20:53:46.216000 audit[1780]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.216000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd55256ac0 a2=0 a3=7ffd55256aac items=0 ppid=1723 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 20:53:46.217000 audit[1782]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.217000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd28a05fb0 a2=0 a3=7ffd28a05f9c items=0 ppid=1723 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 20:53:46.262000 audit[1785]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.262000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff801b0ff0 a2=0 a3=7fff801b0fdc items=0 ppid=1723 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 20:53:46.263000 audit[1786]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.263000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedda0d160 a2=0 a3=7ffedda0d14c items=0 ppid=1723 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 20:53:46.264000 audit[1788]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.264000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1966e6e0 a2=0 a3=7ffd1966e6cc items=0 ppid=1723 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 20:53:46.265000 audit[1789]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.265000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3c643cc0 a2=0 a3=7fff3c643cac items=0 ppid=1723 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 20:53:46.266000 audit[1791]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.266000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd71303ad0 a2=0 a3=7ffd71303abc items=0 ppid=1723 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 20:53:46.268000 audit[1794]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.268000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8ff62650 a2=0 a3=7ffc8ff6263c items=0 ppid=1723 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 20:53:46.268000 audit[1795]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.268000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe78469800 a2=0 a3=7ffe784697ec items=0 ppid=1723 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 20:53:46.269000 audit[1797]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.269000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9b0a4630 a2=0 a3=7ffe9b0a461c items=0 ppid=1723 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 20:53:46.270000 audit[1798]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.270000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd22f34540 a2=0 a3=7ffd22f3452c items=0 ppid=1723 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 20:53:46.271000 audit[1800]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.271000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc6627b80 a2=0 a3=7fffc6627b6c items=0 ppid=1723 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:53:46.273000 audit[1803]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.273000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7d203fd0 a2=0 a3=7ffe7d203fbc items=0 ppid=1723 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:53:46.275000 audit[1806]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.275000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff751a6ae0 a2=0 a3=7fff751a6acc items=0 ppid=1723 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 20:53:46.275000 audit[1807]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.275000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdddc363d0 a2=0 a3=7ffdddc363bc items=0 ppid=1723 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 20:53:46.276000 audit[1809]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.276000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffdb8f9320 a2=0 a3=7fffdb8f930c items=0 ppid=1723 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:53:46.310000 audit[1815]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.310000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc3d16a3e0 a2=0 a3=7ffc3d16a3cc items=0 ppid=1723 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:53:46.313000 audit[1820]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.313000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd06018c0 a2=0 a3=7ffdd06018ac items=0 ppid=1723 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 20:53:46.314000 audit[1822]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:53:46.314000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdee9751b0 a2=0 a3=7ffdee97519c items=0 ppid=1723 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 20:53:46.318000 audit[1824]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:53:46.318000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe3eae7da0 a2=0 a3=7ffe3eae7d8c items=0 ppid=1723 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:53:46.345325 kubelet[1560]: E0412 20:53:46.345279 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:46.359000 audit[1824]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:53:46.359000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe3eae7da0 a2=0 a3=7ffe3eae7d8c items=0 ppid=1723 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:53:46.373000 audit[1832]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.373000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf35edad0 a2=0 a3=7ffcf35edabc items=0 ppid=1723 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 20:53:46.375000 audit[1834]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.375000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc66f02c70 a2=0 a3=7ffc66f02c5c items=0 ppid=1723 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 20:53:46.379000 audit[1837]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.379000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe916d67a0 a2=0 a3=7ffe916d678c items=0 ppid=1723 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 20:53:46.380000 audit[1838]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.380000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc602e7e0 a2=0 a3=7ffdc602e7cc items=0 ppid=1723 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 20:53:46.382000 audit[1840]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.382000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdad516fd0 a2=0 a3=7ffdad516fbc items=0 ppid=1723 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 20:53:46.383000 audit[1841]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.383000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd011c7730 a2=0 a3=7ffd011c771c items=0 ppid=1723 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 20:53:46.385000 audit[1843]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.385000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe19671c30 a2=0 a3=7ffe19671c1c items=0 ppid=1723 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 20:53:46.388000 audit[1846]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.388000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe52218140 a2=0 a3=7ffe5221812c items=0 ppid=1723 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 20:53:46.389000 audit[1847]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.389000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6a08e690 a2=0 a3=7ffe6a08e67c items=0 ppid=1723 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 20:53:46.391000 audit[1849]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.391000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd64485f0 a2=0 a3=7ffcd64485dc items=0 ppid=1723 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 20:53:46.392000 audit[1850]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.392000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2dd747f0 a2=0 a3=7ffd2dd747dc items=0 ppid=1723 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 20:53:46.395000 audit[1852]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.395000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe121fcc0 a2=0 a3=7fffe121fcac items=0 ppid=1723 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:53:46.398000 audit[1855]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.398000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff98c4f600 a2=0 a3=7fff98c4f5ec items=0 ppid=1723 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 20:53:46.401000 audit[1858]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.401000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca13eca50 a2=0 a3=7ffca13eca3c items=0 ppid=1723 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 20:53:46.402000 audit[1859]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.402000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc24be9f0 a2=0 a3=7ffcc24be9dc items=0 ppid=1723 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 20:53:46.404000 audit[1861]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.404000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffde0cb5d80 a2=0 a3=7ffde0cb5d6c items=0 ppid=1723 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:53:46.407000 audit[1864]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.407000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffccf8a58c0 a2=0 a3=7ffccf8a58ac items=0 ppid=1723 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:53:46.408000 audit[1865]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.408000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdda2dfc60 a2=0 a3=7ffdda2dfc4c items=0 ppid=1723 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 20:53:46.410000 audit[1867]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.410000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc705cf160 a2=0 a3=7ffc705cf14c items=0 ppid=1723 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:53:46.413000 audit[1870]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.413000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde4ba9310 a2=0 a3=7ffde4ba92fc items=0 ppid=1723 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:53:46.414000 audit[1871]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.414000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9006bf50 a2=0 a3=7ffd9006bf3c items=0 ppid=1723 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 20:53:46.416000 audit[1873]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:53:46.416000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd0a9d2620 a2=0 a3=7ffd0a9d260c items=0 ppid=1723 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 20:53:46.418000 audit[1875]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 20:53:46.418000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff4d595780 a2=0 a3=7fff4d59576c items=0 ppid=1723 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.418000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:53:46.419000 audit[1875]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 20:53:46.419000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff4d595780 a2=0 a3=7fff4d59576c items=0 ppid=1723 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:46.419000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:53:46.585381 kubelet[1560]: E0412 20:53:46.585282 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.585381 kubelet[1560]: W0412 20:53:46.585320 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.585381 kubelet[1560]: E0412 20:53:46.585369 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.585988 kubelet[1560]: E0412 20:53:46.585904 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.585988 kubelet[1560]: W0412 20:53:46.585937 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.585988 kubelet[1560]: E0412 20:53:46.585979 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.586597 kubelet[1560]: E0412 20:53:46.586548 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.586597 kubelet[1560]: W0412 20:53:46.586586 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.586867 kubelet[1560]: E0412 20:53:46.586628 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.587294 kubelet[1560]: E0412 20:53:46.587224 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.587294 kubelet[1560]: W0412 20:53:46.587280 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.587549 kubelet[1560]: E0412 20:53:46.587324 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.587549 kubelet[1560]: I0412 20:53:46.587488 1560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qv6mh" podStartSLOduration=3.349486498 podCreationTimestamp="2024-04-12 20:53:42 +0000 UTC" firstStartedPulling="2024-04-12 20:53:44.40389222 +0000 UTC m=+2.398279117" lastFinishedPulling="2024-04-12 20:53:45.641785276 +0000 UTC m=+3.636172171" observedRunningTime="2024-04-12 20:53:46.586935032 +0000 UTC m=+4.581321996" watchObservedRunningTime="2024-04-12 20:53:46.587379552 +0000 UTC m=+4.581766496" Apr 12 20:53:46.587924 kubelet[1560]: E0412 20:53:46.587860 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.587924 kubelet[1560]: W0412 20:53:46.587893 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.588165 kubelet[1560]: E0412 20:53:46.587934 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.588579 kubelet[1560]: E0412 20:53:46.588500 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.588579 kubelet[1560]: W0412 20:53:46.588534 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.588579 kubelet[1560]: E0412 20:53:46.588576 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.589177 kubelet[1560]: E0412 20:53:46.589147 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.589177 kubelet[1560]: W0412 20:53:46.589174 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.589430 kubelet[1560]: E0412 20:53:46.589211 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.589805 kubelet[1560]: E0412 20:53:46.589725 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.589805 kubelet[1560]: W0412 20:53:46.589759 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.589805 kubelet[1560]: E0412 20:53:46.589800 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.590347 kubelet[1560]: E0412 20:53:46.590280 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.590347 kubelet[1560]: W0412 20:53:46.590304 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.590347 kubelet[1560]: E0412 20:53:46.590338 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.590950 kubelet[1560]: E0412 20:53:46.590897 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.590950 kubelet[1560]: W0412 20:53:46.590921 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.590950 kubelet[1560]: E0412 20:53:46.590953 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.591549 kubelet[1560]: E0412 20:53:46.591470 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.591549 kubelet[1560]: W0412 20:53:46.591503 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.591549 kubelet[1560]: E0412 20:53:46.591543 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.592126 kubelet[1560]: E0412 20:53:46.592092 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.592259 kubelet[1560]: W0412 20:53:46.592126 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.592259 kubelet[1560]: E0412 20:53:46.592168 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.592801 kubelet[1560]: E0412 20:53:46.592721 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.592801 kubelet[1560]: W0412 20:53:46.592755 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.592801 kubelet[1560]: E0412 20:53:46.592795 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.593356 kubelet[1560]: E0412 20:53:46.593288 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.593356 kubelet[1560]: W0412 20:53:46.593312 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.593356 kubelet[1560]: E0412 20:53:46.593345 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.593933 kubelet[1560]: E0412 20:53:46.593874 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.593933 kubelet[1560]: W0412 20:53:46.593908 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.594181 kubelet[1560]: E0412 20:53:46.593949 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.594617 kubelet[1560]: E0412 20:53:46.594532 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.594617 kubelet[1560]: W0412 20:53:46.594567 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.594617 kubelet[1560]: E0412 20:53:46.594606 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.595307 kubelet[1560]: E0412 20:53:46.595221 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.595307 kubelet[1560]: W0412 20:53:46.595295 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.595537 kubelet[1560]: E0412 20:53:46.595333 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.595923 kubelet[1560]: E0412 20:53:46.595865 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.595923 kubelet[1560]: W0412 20:53:46.595899 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.596155 kubelet[1560]: E0412 20:53:46.595948 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.596583 kubelet[1560]: E0412 20:53:46.596501 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.596583 kubelet[1560]: W0412 20:53:46.596537 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.596583 kubelet[1560]: E0412 20:53:46.596588 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.597135 kubelet[1560]: E0412 20:53:46.597098 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.597135 kubelet[1560]: W0412 20:53:46.597134 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.597442 kubelet[1560]: E0412 20:53:46.597186 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.597821 kubelet[1560]: E0412 20:53:46.597759 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.597821 kubelet[1560]: W0412 20:53:46.597794 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.598034 kubelet[1560]: E0412 20:53:46.597927 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.598407 kubelet[1560]: E0412 20:53:46.598332 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.598407 kubelet[1560]: W0412 20:53:46.598358 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.598407 kubelet[1560]: E0412 20:53:46.598404 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.598971 kubelet[1560]: E0412 20:53:46.598935 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.599084 kubelet[1560]: W0412 20:53:46.598970 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.599084 kubelet[1560]: E0412 20:53:46.599020 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.599568 kubelet[1560]: E0412 20:53:46.599508 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.599568 kubelet[1560]: W0412 20:53:46.599543 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.599821 kubelet[1560]: E0412 20:53:46.599671 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.600134 kubelet[1560]: E0412 20:53:46.600108 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.600273 kubelet[1560]: W0412 20:53:46.600135 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.600273 kubelet[1560]: E0412 20:53:46.600183 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.600941 kubelet[1560]: E0412 20:53:46.600881 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.600941 kubelet[1560]: W0412 20:53:46.600913 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.601287 kubelet[1560]: E0412 20:53:46.600962 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.601699 kubelet[1560]: E0412 20:53:46.601614 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.601699 kubelet[1560]: W0412 20:53:46.601653 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.601699 kubelet[1560]: E0412 20:53:46.601704 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.602257 kubelet[1560]: E0412 20:53:46.602205 1560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:53:46.602257 kubelet[1560]: W0412 20:53:46.602252 1560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:53:46.602509 kubelet[1560]: E0412 20:53:46.602293 1560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:53:46.788810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1543727540.mount: Deactivated successfully. Apr 12 20:53:47.346186 kubelet[1560]: E0412 20:53:47.346125 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:47.502245 env[1159]: time="2024-04-12T20:53:47.502192728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:47.502964 env[1159]: time="2024-04-12T20:53:47.502924761Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:47.504052 env[1159]: time="2024-04-12T20:53:47.504006835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:47.505295 env[1159]: time="2024-04-12T20:53:47.505252599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:47.505720 env[1159]: time="2024-04-12T20:53:47.505679083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 20:53:47.506708 env[1159]: time="2024-04-12T20:53:47.506664173Z" level=info msg="CreateContainer within sandbox \"aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 20:53:47.511530 env[1159]: time="2024-04-12T20:53:47.511487108Z" level=info msg="CreateContainer within sandbox \"aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03\"" Apr 12 20:53:47.511820 env[1159]: time="2024-04-12T20:53:47.511781893Z" level=info msg="StartContainer for \"2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03\"" Apr 12 20:53:47.520523 systemd[1]: Started cri-containerd-2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03.scope. Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f57c2c36e78 items=0 ppid=1646 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353731326635666362323539396366616438653633373134376630 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit: BPF prog-id=76 op=LOAD Apr 12 20:53:47.526000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000277c58 items=0 ppid=1646 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353731326635666362323539396366616438653633373134376630 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.526000 audit: BPF prog-id=77 op=LOAD Apr 12 20:53:47.526000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000277ca8 items=0 ppid=1646 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353731326635666362323539396366616438653633373134376630 Apr 12 20:53:47.527000 audit: BPF prog-id=77 op=UNLOAD Apr 12 20:53:47.527000 audit: BPF prog-id=76 op=UNLOAD Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:47.527000 audit: BPF prog-id=78 op=LOAD Apr 12 20:53:47.527000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000277d38 items=0 ppid=1646 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:47.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353731326635666362323539396366616438653633373134376630 Apr 12 20:53:47.533940 env[1159]: time="2024-04-12T20:53:47.533914211Z" level=info msg="StartContainer for \"2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03\" returns successfully" Apr 12 20:53:47.539477 systemd[1]: cri-containerd-2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03.scope: Deactivated successfully. Apr 12 20:53:47.556802 kubelet[1560]: E0412 20:53:47.556787 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wz7gr" podUID=f250c946-2324-4641-acec-9b43864ff141 Apr 12 20:53:47.557000 audit: BPF prog-id=78 op=UNLOAD Apr 12 20:53:47.785813 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03-rootfs.mount: Deactivated successfully. Apr 12 20:53:47.824150 env[1159]: time="2024-04-12T20:53:47.824043403Z" level=info msg="shim disconnected" id=2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03 Apr 12 20:53:47.824498 env[1159]: time="2024-04-12T20:53:47.824153962Z" level=warning msg="cleaning up after shim disconnected" id=2e5712f5fcb2599cfad8e637147f0a6511e36c73b21148e4625749c7013e8b03 namespace=k8s.io Apr 12 20:53:47.824498 env[1159]: time="2024-04-12T20:53:47.824194987Z" level=info msg="cleaning up dead shim" Apr 12 20:53:47.837613 env[1159]: time="2024-04-12T20:53:47.837570177Z" level=warning msg="cleanup warnings time=\"2024-04-12T20:53:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1953 runtime=io.containerd.runc.v2\n" Apr 12 20:53:48.346789 kubelet[1560]: E0412 20:53:48.346713 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:48.581570 env[1159]: time="2024-04-12T20:53:48.581489695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 20:53:49.346982 kubelet[1560]: E0412 20:53:49.346879 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:49.557587 kubelet[1560]: E0412 20:53:49.557495 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wz7gr" podUID=f250c946-2324-4641-acec-9b43864ff141 Apr 12 20:53:49.887782 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2985189079.mount: Deactivated successfully. Apr 12 20:53:50.348023 kubelet[1560]: E0412 20:53:50.348000 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:51.348284 kubelet[1560]: E0412 20:53:51.348262 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:51.556521 kubelet[1560]: E0412 20:53:51.556476 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wz7gr" podUID=f250c946-2324-4641-acec-9b43864ff141 Apr 12 20:53:51.899139 env[1159]: time="2024-04-12T20:53:51.899118131Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:51.899714 env[1159]: time="2024-04-12T20:53:51.899702458Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:51.900780 env[1159]: time="2024-04-12T20:53:51.900768439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:51.901748 env[1159]: time="2024-04-12T20:53:51.901702261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:51.902684 env[1159]: time="2024-04-12T20:53:51.902638309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 20:53:51.903652 env[1159]: time="2024-04-12T20:53:51.903612418Z" level=info msg="CreateContainer within sandbox \"aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 20:53:51.908704 env[1159]: time="2024-04-12T20:53:51.908661310Z" level=info msg="CreateContainer within sandbox \"aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d\"" Apr 12 20:53:51.909027 env[1159]: time="2024-04-12T20:53:51.908974586Z" level=info msg="StartContainer for \"7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d\"" Apr 12 20:53:51.918066 systemd[1]: Started cri-containerd-7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d.scope. Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.953105 kernel: kauditd_printk_skb: 230 callbacks suppressed Apr 12 20:53:51.953145 kernel: audit: type=1400 audit(1712955231.924:627): avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efe344f4d38 items=0 ppid=1646 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:52.113407 kernel: audit: type=1300 audit(1712955231.924:627): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efe344f4d38 items=0 ppid=1646 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:52.113439 kernel: audit: type=1327 audit(1712955231.924:627): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313464366434646438376433643035373166393230333135363532 Apr 12 20:53:51.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313464366434646438376433643035373166393230333135363532 Apr 12 20:53:52.206413 kernel: audit: type=1400 audit(1712955231.924:628): avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.269674 kernel: audit: type=1400 audit(1712955231.924:628): avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.332890 kernel: audit: type=1400 audit(1712955231.924:628): avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.348367 kubelet[1560]: E0412 20:53:52.348323 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:52.396089 kernel: audit: type=1400 audit(1712955231.924:628): avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.401482 env[1159]: time="2024-04-12T20:53:52.401422948Z" level=info msg="StartContainer for \"7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d\" returns successfully" Apr 12 20:53:52.459740 kernel: audit: type=1400 audit(1712955231.924:628): avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.523309 kernel: audit: type=1400 audit(1712955231.924:628): avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.650548 kernel: audit: type=1400 audit(1712955231.924:628): avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:51.924000 audit: BPF prog-id=79 op=LOAD Apr 12 20:53:51.924000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003821e8 items=0 ppid=1646 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:51.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313464366434646438376433643035373166393230333135363532 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.015000 audit: BPF prog-id=80 op=LOAD Apr 12 20:53:52.015000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000382238 items=0 ppid=1646 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:52.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313464366434646438376433643035373166393230333135363532 Apr 12 20:53:52.205000 audit: BPF prog-id=80 op=UNLOAD Apr 12 20:53:52.205000 audit: BPF prog-id=79 op=UNLOAD Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:52.205000 audit: BPF prog-id=81 op=LOAD Apr 12 20:53:52.205000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003822c8 items=0 ppid=1646 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:52.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313464366434646438376433643035373166393230333135363532 Apr 12 20:53:52.987579 systemd[1]: cri-containerd-7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d.scope: Deactivated successfully. Apr 12 20:53:52.996000 audit: BPF prog-id=81 op=UNLOAD Apr 12 20:53:53.004966 kubelet[1560]: I0412 20:53:53.004916 1560 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 20:53:53.025001 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d-rootfs.mount: Deactivated successfully. Apr 12 20:53:53.348910 kubelet[1560]: E0412 20:53:53.348695 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:53.498003 env[1159]: time="2024-04-12T20:53:53.497843925Z" level=info msg="shim disconnected" id=7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d Apr 12 20:53:53.498003 env[1159]: time="2024-04-12T20:53:53.497967825Z" level=warning msg="cleaning up after shim disconnected" id=7014d6d4dd87d3d0571f920315652c2ce601709350d8dcf5d62c59bae15ea48d namespace=k8s.io Apr 12 20:53:53.498003 env[1159]: time="2024-04-12T20:53:53.498005256Z" level=info msg="cleaning up dead shim" Apr 12 20:53:53.506436 env[1159]: time="2024-04-12T20:53:53.506391556Z" level=warning msg="cleanup warnings time=\"2024-04-12T20:53:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2025 runtime=io.containerd.runc.v2\n" Apr 12 20:53:53.563217 systemd[1]: Created slice kubepods-besteffort-podf250c946_2324_4641_acec_9b43864ff141.slice. Apr 12 20:53:53.565849 env[1159]: time="2024-04-12T20:53:53.565768316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wz7gr,Uid:f250c946-2324-4641-acec-9b43864ff141,Namespace:calico-system,Attempt:0,}" Apr 12 20:53:53.588704 env[1159]: time="2024-04-12T20:53:53.588657946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 20:53:53.599909 env[1159]: time="2024-04-12T20:53:53.599828206Z" level=error msg="Failed to destroy network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:53.600087 env[1159]: time="2024-04-12T20:53:53.600065745Z" level=error msg="encountered an error cleaning up failed sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:53.600137 env[1159]: time="2024-04-12T20:53:53.600102589Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wz7gr,Uid:f250c946-2324-4641-acec-9b43864ff141,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:53.600292 kubelet[1560]: E0412 20:53:53.600250 1560 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:53.600292 kubelet[1560]: E0412 20:53:53.600287 1560 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wz7gr" Apr 12 20:53:53.600373 kubelet[1560]: E0412 20:53:53.600302 1560 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wz7gr" Apr 12 20:53:53.600373 kubelet[1560]: E0412 20:53:53.600334 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wz7gr_calico-system(f250c946-2324-4641-acec-9b43864ff141)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wz7gr_calico-system(f250c946-2324-4641-acec-9b43864ff141)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wz7gr" podUID=f250c946-2324-4641-acec-9b43864ff141 Apr 12 20:53:53.600818 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755-shm.mount: Deactivated successfully. Apr 12 20:53:54.349037 kubelet[1560]: E0412 20:53:54.348933 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:54.592769 kubelet[1560]: I0412 20:53:54.592718 1560 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Apr 12 20:53:54.594114 env[1159]: time="2024-04-12T20:53:54.593967770Z" level=info msg="StopPodSandbox for \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\"" Apr 12 20:53:54.625239 env[1159]: time="2024-04-12T20:53:54.625151641Z" level=error msg="StopPodSandbox for \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\" failed" error="failed to destroy network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:54.625430 kubelet[1560]: E0412 20:53:54.625373 1560 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Apr 12 20:53:54.625430 kubelet[1560]: E0412 20:53:54.625402 1560 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755} Apr 12 20:53:54.625430 kubelet[1560]: E0412 20:53:54.625424 1560 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f250c946-2324-4641-acec-9b43864ff141\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:53:54.625552 kubelet[1560]: E0412 20:53:54.625441 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f250c946-2324-4641-acec-9b43864ff141\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wz7gr" podUID=f250c946-2324-4641-acec-9b43864ff141 Apr 12 20:53:55.017368 kubelet[1560]: I0412 20:53:55.017311 1560 topology_manager.go:212] "Topology Admit Handler" Apr 12 20:53:55.020942 systemd[1]: Created slice kubepods-besteffort-pod88da111a_51fe_4923_8dfc_fc1906c3f5c4.slice. Apr 12 20:53:55.153943 kubelet[1560]: I0412 20:53:55.153881 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cn62v\" (UniqueName: \"kubernetes.io/projected/88da111a-51fe-4923-8dfc-fc1906c3f5c4-kube-api-access-cn62v\") pod \"nginx-deployment-845c78c8b9-5kpbd\" (UID: \"88da111a-51fe-4923-8dfc-fc1906c3f5c4\") " pod="default/nginx-deployment-845c78c8b9-5kpbd" Apr 12 20:53:55.324188 env[1159]: time="2024-04-12T20:53:55.324053535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5kpbd,Uid:88da111a-51fe-4923-8dfc-fc1906c3f5c4,Namespace:default,Attempt:0,}" Apr 12 20:53:55.343472 systemd-timesyncd[1106]: Contacted time server [2604:a880:400:d0::83:2002]:123 (2.flatcar.pool.ntp.org). Apr 12 20:53:55.343638 systemd-timesyncd[1106]: Initial clock synchronization to Fri 2024-04-12 20:53:55.539824 UTC. Apr 12 20:53:55.349489 kubelet[1560]: E0412 20:53:55.349385 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:55.486389 env[1159]: time="2024-04-12T20:53:55.486326890Z" level=error msg="Failed to destroy network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:55.486560 env[1159]: time="2024-04-12T20:53:55.486515082Z" level=error msg="encountered an error cleaning up failed sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:55.486560 env[1159]: time="2024-04-12T20:53:55.486547142Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5kpbd,Uid:88da111a-51fe-4923-8dfc-fc1906c3f5c4,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:55.486760 kubelet[1560]: E0412 20:53:55.486719 1560 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:55.486760 kubelet[1560]: E0412 20:53:55.486752 1560 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-5kpbd" Apr 12 20:53:55.486826 kubelet[1560]: E0412 20:53:55.486765 1560 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-5kpbd" Apr 12 20:53:55.486826 kubelet[1560]: E0412 20:53:55.486796 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-5kpbd_default(88da111a-51fe-4923-8dfc-fc1906c3f5c4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-5kpbd_default(88da111a-51fe-4923-8dfc-fc1906c3f5c4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-5kpbd" podUID=88da111a-51fe-4923-8dfc-fc1906c3f5c4 Apr 12 20:53:55.487384 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da-shm.mount: Deactivated successfully. Apr 12 20:53:55.593676 kubelet[1560]: I0412 20:53:55.593634 1560 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Apr 12 20:53:55.593998 env[1159]: time="2024-04-12T20:53:55.593933082Z" level=info msg="StopPodSandbox for \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\"" Apr 12 20:53:55.607543 env[1159]: time="2024-04-12T20:53:55.607480116Z" level=error msg="StopPodSandbox for \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\" failed" error="failed to destroy network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:53:55.607772 kubelet[1560]: E0412 20:53:55.607695 1560 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Apr 12 20:53:55.607772 kubelet[1560]: E0412 20:53:55.607720 1560 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da} Apr 12 20:53:55.607772 kubelet[1560]: E0412 20:53:55.607741 1560 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88da111a-51fe-4923-8dfc-fc1906c3f5c4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:53:55.607772 kubelet[1560]: E0412 20:53:55.607758 1560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88da111a-51fe-4923-8dfc-fc1906c3f5c4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-5kpbd" podUID=88da111a-51fe-4923-8dfc-fc1906c3f5c4 Apr 12 20:53:56.350858 kubelet[1560]: E0412 20:53:56.350788 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:57.351169 kubelet[1560]: E0412 20:53:57.351087 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:57.606424 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2953221489.mount: Deactivated successfully. Apr 12 20:53:57.635201 env[1159]: time="2024-04-12T20:53:57.635139990Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:57.635852 env[1159]: time="2024-04-12T20:53:57.635804622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:57.637077 env[1159]: time="2024-04-12T20:53:57.637024505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:57.638218 env[1159]: time="2024-04-12T20:53:57.638165558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:53:57.638870 env[1159]: time="2024-04-12T20:53:57.638811669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 20:53:57.644026 env[1159]: time="2024-04-12T20:53:57.644001597Z" level=info msg="CreateContainer within sandbox \"aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 20:53:57.650752 env[1159]: time="2024-04-12T20:53:57.650695873Z" level=info msg="CreateContainer within sandbox \"aff3b082b3f7dbfcdf0ad6dc5f4189824a764d3a46b2074ce681292f0b717c72\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f944168b7188f02782fb8d5c909c352416212b31ba4bf41e98a69e0208a3e206\"" Apr 12 20:53:57.651067 env[1159]: time="2024-04-12T20:53:57.651020704Z" level=info msg="StartContainer for \"f944168b7188f02782fb8d5c909c352416212b31ba4bf41e98a69e0208a3e206\"" Apr 12 20:53:57.663094 systemd[1]: Started cri-containerd-f944168b7188f02782fb8d5c909c352416212b31ba4bf41e98a69e0208a3e206.scope. Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.701580 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 20:53:57.701668 kernel: audit: type=1400 audit(1712955237.672:634): avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f12261b6e18 items=0 ppid=1646 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:57.866118 kernel: audit: type=1300 audit(1712955237.672:634): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f12261b6e18 items=0 ppid=1646 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:57.866151 kernel: audit: type=1327 audit(1712955237.672:634): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343431363862373138386630323738326662386435633930396333 Apr 12 20:53:57.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343431363862373138386630323738326662386435633930396333 Apr 12 20:53:57.961427 kernel: audit: type=1400 audit(1712955237.672:635): avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:58.026310 kernel: audit: type=1400 audit(1712955237.672:635): avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:58.091115 kernel: audit: type=1400 audit(1712955237.672:635): avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:58.155929 kernel: audit: type=1400 audit(1712955237.672:635): avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:58.222633 kernel: audit: type=1400 audit(1712955237.672:635): avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:58.233063 env[1159]: time="2024-04-12T20:53:58.233038670Z" level=info msg="StartContainer for \"f944168b7188f02782fb8d5c909c352416212b31ba4bf41e98a69e0208a3e206\" returns successfully" Apr 12 20:53:58.287789 kernel: audit: type=1400 audit(1712955237.672:635): avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:58.352162 kubelet[1560]: E0412 20:53:58.352144 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:58.352890 kernel: audit: type=1400 audit(1712955237.672:635): avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.672000 audit: BPF prog-id=82 op=LOAD Apr 12 20:53:57.672000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000926d8 items=0 ppid=1646 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:57.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343431363862373138386630323738326662386435633930396333 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.765000 audit: BPF prog-id=83 op=LOAD Apr 12 20:53:57.765000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000092728 items=0 ppid=1646 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:57.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343431363862373138386630323738326662386435633930396333 Apr 12 20:53:57.960000 audit: BPF prog-id=83 op=UNLOAD Apr 12 20:53:57.960000 audit: BPF prog-id=82 op=UNLOAD Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:53:57.960000 audit: BPF prog-id=84 op=LOAD Apr 12 20:53:57.960000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000927b8 items=0 ppid=1646 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:57.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343431363862373138386630323738326662386435633930396333 Apr 12 20:53:58.503768 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 20:53:58.503798 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 20:53:58.618190 kubelet[1560]: I0412 20:53:58.618146 1560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-zvtrg" podStartSLOduration=3.383121275 podCreationTimestamp="2024-04-12 20:53:42 +0000 UTC" firstStartedPulling="2024-04-12 20:53:44.403993042 +0000 UTC m=+2.398379936" lastFinishedPulling="2024-04-12 20:53:57.638988559 +0000 UTC m=+15.633375465" observedRunningTime="2024-04-12 20:53:58.61778328 +0000 UTC m=+16.612170188" watchObservedRunningTime="2024-04-12 20:53:58.618116804 +0000 UTC m=+16.612503703" Apr 12 20:53:59.353423 kubelet[1560]: E0412 20:53:59.353345 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:53:59.604849 kubelet[1560]: I0412 20:53:59.604607 1560 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 20:53:59.853000 audit[2337]: AVC avc: denied { write } for pid=2337 comm="tee" name="fd" dev="proc" ino=28917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:53:59.853000 audit[2327]: AVC avc: denied { write } for pid=2327 comm="tee" name="fd" dev="proc" ino=25279 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:53:59.853000 audit[2337]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb7a3e97b a2=241 a3=1b6 items=1 ppid=2293 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:59.853000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 20:53:59.853000 audit: PATH item=0 name="/dev/fd/63" inode=28914 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:59.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:53:59.853000 audit[2327]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff088e397d a2=241 a3=1b6 items=1 ppid=2296 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:59.853000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 20:53:59.853000 audit: PATH item=0 name="/dev/fd/63" inode=25276 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:59.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:53:59.853000 audit[2332]: AVC avc: denied { write } for pid=2332 comm="tee" name="fd" dev="proc" ino=17157 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:53:59.853000 audit[2331]: AVC avc: denied { write } for pid=2331 comm="tee" name="fd" dev="proc" ino=30838 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:53:59.853000 audit[2331]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8e59497c a2=241 a3=1b6 items=1 ppid=2291 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:59.853000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 20:53:59.853000 audit: PATH item=0 name="/dev/fd/63" inode=30835 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:59.853000 audit[2332]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe81bdd96b a2=241 a3=1b6 items=1 ppid=2292 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:59.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:53:59.853000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 20:53:59.853000 audit: PATH item=0 name="/dev/fd/63" inode=17154 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:59.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:53:59.853000 audit[2336]: AVC avc: denied { write } for pid=2336 comm="tee" name="fd" dev="proc" ino=19247 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:53:59.853000 audit[2338]: AVC avc: denied { write } for pid=2338 comm="tee" name="fd" dev="proc" ino=26455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:53:59.853000 audit[2336]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc778296c a2=241 a3=1b6 items=1 ppid=2294 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:59.853000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 20:53:59.853000 audit: PATH item=0 name="/dev/fd/63" inode=19244 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:59.853000 audit[2338]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe31ed797b a2=241 a3=1b6 items=1 ppid=2298 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:59.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:53:59.853000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 20:53:59.853000 audit: PATH item=0 name="/dev/fd/63" inode=26452 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:59.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:53:59.854000 audit[2335]: AVC avc: denied { write } for pid=2335 comm="tee" name="fd" dev="proc" ino=25283 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:53:59.854000 audit[2335]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd05f997b a2=241 a3=1b6 items=1 ppid=2295 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:53:59.854000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 20:53:59.854000 audit: PATH item=0 name="/dev/fd/63" inode=11212 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:53:59.854000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:53:59.936284 kernel: Initializing XFRM netlink socket Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit: BPF prog-id=85 op=LOAD Apr 12 20:54:00.053000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43dc9c30 a2=70 a3=7f2e1f46c000 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.053000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.053000 audit: BPF prog-id=85 op=UNLOAD Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit: BPF prog-id=86 op=LOAD Apr 12 20:54:00.053000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43dc9c30 a2=70 a3=6f items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.053000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.053000 audit: BPF prog-id=86 op=UNLOAD Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe43dc9be0 a2=70 a3=7ffe43dc9c30 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.053000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit: BPF prog-id=87 op=LOAD Apr 12 20:54:00.053000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe43dc9bc0 a2=70 a3=7ffe43dc9c30 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.053000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.053000 audit: BPF prog-id=87 op=UNLOAD Apr 12 20:54:00.053000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.053000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43dc9ca0 a2=70 a3=0 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.053000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43dc9c90 a2=70 a3=0 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.054000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43dc9c00 a2=70 a3=0 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.054000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe43dc9cd0 a2=70 a3=1695e10 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.054000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe43dc9cd0 a2=70 a3=1692880 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.054000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.054000 audit: BPF prog-id=88 op=LOAD Apr 12 20:54:00.054000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe43dc9bf0 a2=70 a3=0 items=0 ppid=2303 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.054000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:54:00.057000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.057000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffbc1290d0 a2=70 a3=fff80800 items=0 ppid=2303 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 20:54:00.057000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:00.057000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffbc128fa0 a2=70 a3=3 items=0 ppid=2303 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 20:54:00.068000 audit: BPF prog-id=88 op=UNLOAD Apr 12 20:54:00.128000 audit[2525]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2525 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:00.128000 audit[2525]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc04b8b340 a2=0 a3=7ffc04b8b32c items=0 ppid=2303 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.128000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:00.134000 audit[2526]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2526 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:00.134000 audit[2526]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc20a70d10 a2=0 a3=7ffc20a70cfc items=0 ppid=2303 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.134000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:00.136000 audit[2528]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:00.136000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc9381ddf0 a2=0 a3=7ffc9381dddc items=0 ppid=2303 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.136000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:00.138000 audit[2529]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:00.138000 audit[2529]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc86a05100 a2=0 a3=7ffc86a050ec items=0 ppid=2303 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:00.138000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:00.354280 kubelet[1560]: E0412 20:54:00.354160 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:00.957154 systemd-networkd[1008]: vxlan.calico: Link UP Apr 12 20:54:00.957158 systemd-networkd[1008]: vxlan.calico: Gained carrier Apr 12 20:54:01.354894 kubelet[1560]: E0412 20:54:01.354690 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:02.344172 kubelet[1560]: E0412 20:54:02.344051 1560 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:02.355550 kubelet[1560]: E0412 20:54:02.355484 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:02.384315 systemd-networkd[1008]: vxlan.calico: Gained IPv6LL Apr 12 20:54:03.356662 kubelet[1560]: E0412 20:54:03.356588 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:04.357398 kubelet[1560]: E0412 20:54:04.357229 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:05.358508 kubelet[1560]: E0412 20:54:05.358379 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:06.330254 kubelet[1560]: I0412 20:54:06.330126 1560 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 20:54:06.359277 kubelet[1560]: E0412 20:54:06.359255 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:06.558641 env[1159]: time="2024-04-12T20:54:06.558528620Z" level=info msg="StopPodSandbox for \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\"" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.602 [INFO][2615] k8s.go 585: Cleaning up netns ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.602 [INFO][2615] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" iface="eth0" netns="/var/run/netns/cni-87ad8fee-93da-b20e-d806-7fa230d4cd4f" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.602 [INFO][2615] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" iface="eth0" netns="/var/run/netns/cni-87ad8fee-93da-b20e-d806-7fa230d4cd4f" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.602 [INFO][2615] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" iface="eth0" netns="/var/run/netns/cni-87ad8fee-93da-b20e-d806-7fa230d4cd4f" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.602 [INFO][2615] k8s.go 592: Releasing IP address(es) ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.602 [INFO][2615] utils.go 188: Calico CNI releasing IP address ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.612 [INFO][2629] ipam_plugin.go 415: Releasing address using handleID ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" HandleID="k8s-pod-network.eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Workload="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.612 [INFO][2629] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.612 [INFO][2629] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.618 [WARNING][2629] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" HandleID="k8s-pod-network.eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Workload="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.618 [INFO][2629] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" HandleID="k8s-pod-network.eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Workload="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.619 [INFO][2629] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:54:06.621628 env[1159]: 2024-04-12 20:54:06.620 [INFO][2615] k8s.go 598: Teardown processing complete. ContainerID="eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755" Apr 12 20:54:06.622244 env[1159]: time="2024-04-12T20:54:06.621739923Z" level=info msg="TearDown network for sandbox \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\" successfully" Apr 12 20:54:06.622244 env[1159]: time="2024-04-12T20:54:06.621767570Z" level=info msg="StopPodSandbox for \"eadc5ff63bec4937a3fb89d9d79c5caea2b1cb9044af0e09c5f0bc8cbee6b755\" returns successfully" Apr 12 20:54:06.622244 env[1159]: time="2024-04-12T20:54:06.622213218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wz7gr,Uid:f250c946-2324-4641-acec-9b43864ff141,Namespace:calico-system,Attempt:1,}" Apr 12 20:54:06.623060 systemd[1]: run-netns-cni\x2d87ad8fee\x2d93da\x2db20e\x2dd806\x2d7fa230d4cd4f.mount: Deactivated successfully. Apr 12 20:54:06.770135 systemd-networkd[1008]: calic753a0a9d7f: Link UP Apr 12 20:54:06.838281 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:54:06.838318 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic753a0a9d7f: link becomes ready Apr 12 20:54:06.838330 systemd-networkd[1008]: calic753a0a9d7f: Gained carrier Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.657 [INFO][2646] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.3-k8s-csi--node--driver--wz7gr-eth0 csi-node-driver- calico-system f250c946-2324-4641-acec-9b43864ff141 2377 0 2024-04-12 20:53:42 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.3 csi-node-driver-wz7gr eth0 default [] [] [kns.calico-system ksa.calico-system.default] calic753a0a9d7f [] []}} ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.658 [INFO][2646] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.683 [INFO][2667] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" HandleID="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Workload="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.704 [INFO][2667] ipam_plugin.go 268: Auto assigning IP ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" HandleID="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Workload="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bc840), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.3", "pod":"csi-node-driver-wz7gr", "timestamp":"2024-04-12 20:54:06.683931863 +0000 UTC"}, Hostname:"10.67.80.3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.704 [INFO][2667] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.704 [INFO][2667] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.704 [INFO][2667] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.3' Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.707 [INFO][2667] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.716 [INFO][2667] ipam.go 372: Looking up existing affinities for host host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.725 [INFO][2667] ipam.go 489: Trying affinity for 192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.730 [INFO][2667] ipam.go 155: Attempting to load block cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.735 [INFO][2667] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.736 [INFO][2667] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.0/26 handle="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.740 [INFO][2667] ipam.go 1682: Creating new handle: k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31 Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.747 [INFO][2667] ipam.go 1203: Writing block in order to claim IPs block=192.168.59.0/26 handle="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.759 [INFO][2667] ipam.go 1216: Successfully claimed IPs: [192.168.59.1/26] block=192.168.59.0/26 handle="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.759 [INFO][2667] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.1/26] handle="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" host="10.67.80.3" Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.759 [INFO][2667] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:54:06.854470 env[1159]: 2024-04-12 20:54:06.759 [INFO][2667] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.59.1/26] IPv6=[] ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" HandleID="k8s-pod-network.aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Workload="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.854952 env[1159]: 2024-04-12 20:54:06.766 [INFO][2646] k8s.go 385: Populated endpoint ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-csi--node--driver--wz7gr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f250c946-2324-4641-acec-9b43864ff141", ResourceVersion:"2377", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"", Pod:"csi-node-driver-wz7gr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic753a0a9d7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:06.854952 env[1159]: 2024-04-12 20:54:06.767 [INFO][2646] k8s.go 386: Calico CNI using IPs: [192.168.59.1/32] ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.854952 env[1159]: 2024-04-12 20:54:06.767 [INFO][2646] dataplane_linux.go 68: Setting the host side veth name to calic753a0a9d7f ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.854952 env[1159]: 2024-04-12 20:54:06.838 [INFO][2646] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.854952 env[1159]: 2024-04-12 20:54:06.838 [INFO][2646] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-csi--node--driver--wz7gr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f250c946-2324-4641-acec-9b43864ff141", ResourceVersion:"2377", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 53, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31", Pod:"csi-node-driver-wz7gr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic753a0a9d7f", MAC:"36:5b:f3:62:d9:e6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:06.854952 env[1159]: 2024-04-12 20:54:06.853 [INFO][2646] k8s.go 498: Wrote updated endpoint to datastore ContainerID="aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31" Namespace="calico-system" Pod="csi-node-driver-wz7gr" WorkloadEndpoint="10.67.80.3-k8s-csi--node--driver--wz7gr-eth0" Apr 12 20:54:06.860017 env[1159]: time="2024-04-12T20:54:06.859952631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:54:06.860017 env[1159]: time="2024-04-12T20:54:06.859974152Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:54:06.860017 env[1159]: time="2024-04-12T20:54:06.859983247Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:54:06.860142 env[1159]: time="2024-04-12T20:54:06.860081916Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31 pid=2709 runtime=io.containerd.runc.v2 Apr 12 20:54:06.860000 audit[2719]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:06.865512 systemd[1]: Started cri-containerd-aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31.scope. Apr 12 20:54:06.888156 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 20:54:06.888198 kernel: audit: type=1325 audit(1712955246.860:667): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:06.860000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffd5f6b7f40 a2=0 a3=7ffd5f6b7f2c items=0 ppid=2303 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:07.041563 kernel: audit: type=1300 audit(1712955246.860:667): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffd5f6b7f40 a2=0 a3=7ffd5f6b7f2c items=0 ppid=2303 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:07.041616 kernel: audit: type=1327 audit(1712955246.860:667): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:06.860000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:07.102088 kernel: audit: type=1400 audit(1712955246.949:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.164223 kernel: audit: type=1400 audit(1712955246.949:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.226316 kernel: audit: type=1400 audit(1712955246.949:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.288429 kernel: audit: type=1400 audit(1712955246.949:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.351301 kernel: audit: type=1400 audit(1712955246.949:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.359400 kubelet[1560]: E0412 20:54:07.359387 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.475877 kernel: audit: type=1400 audit(1712955246.949:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.475902 kernel: audit: type=1400 audit(1712955246.949:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:06.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit: BPF prog-id=89 op=LOAD Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2709 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:07.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636438333066323465643266346135393930356232363036303237 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2709 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:07.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636438333066323465643266346135393930356232363036303237 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.163000 audit: BPF prog-id=90 op=LOAD Apr 12 20:54:07.163000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000318b00 items=0 ppid=2709 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:07.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636438333066323465643266346135393930356232363036303237 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.350000 audit: BPF prog-id=91 op=LOAD Apr 12 20:54:07.350000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000318b48 items=0 ppid=2709 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:07.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636438333066323465643266346135393930356232363036303237 Apr 12 20:54:07.412000 audit: BPF prog-id=91 op=UNLOAD Apr 12 20:54:07.412000 audit: BPF prog-id=90 op=UNLOAD Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:07.412000 audit: BPF prog-id=92 op=LOAD Apr 12 20:54:07.412000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000318f58 items=0 ppid=2709 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:07.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636438333066323465643266346135393930356232363036303237 Apr 12 20:54:07.542989 env[1159]: time="2024-04-12T20:54:07.542938464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wz7gr,Uid:f250c946-2324-4641-acec-9b43864ff141,Namespace:calico-system,Attempt:1,} returns sandbox id \"aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31\"" Apr 12 20:54:07.543607 env[1159]: time="2024-04-12T20:54:07.543564924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 20:54:08.359820 kubelet[1560]: E0412 20:54:08.359718 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:08.558882 env[1159]: time="2024-04-12T20:54:08.558743173Z" level=info msg="StopPodSandbox for \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\"" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.629 [INFO][2758] k8s.go 585: Cleaning up netns ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.629 [INFO][2758] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" iface="eth0" netns="/var/run/netns/cni-e9752b12-d1fd-12da-4eb7-308cba11c683" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.629 [INFO][2758] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" iface="eth0" netns="/var/run/netns/cni-e9752b12-d1fd-12da-4eb7-308cba11c683" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.629 [INFO][2758] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" iface="eth0" netns="/var/run/netns/cni-e9752b12-d1fd-12da-4eb7-308cba11c683" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.629 [INFO][2758] k8s.go 592: Releasing IP address(es) ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.629 [INFO][2758] utils.go 188: Calico CNI releasing IP address ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.647 [INFO][2775] ipam_plugin.go 415: Releasing address using handleID ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" HandleID="k8s-pod-network.75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Workload="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.647 [INFO][2775] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.647 [INFO][2775] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.652 [WARNING][2775] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" HandleID="k8s-pod-network.75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Workload="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.652 [INFO][2775] ipam_plugin.go 443: Releasing address using workloadID ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" HandleID="k8s-pod-network.75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Workload="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.654 [INFO][2775] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:54:08.655838 env[1159]: 2024-04-12 20:54:08.655 [INFO][2758] k8s.go 598: Teardown processing complete. ContainerID="75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da" Apr 12 20:54:08.656198 env[1159]: time="2024-04-12T20:54:08.655896997Z" level=info msg="TearDown network for sandbox \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\" successfully" Apr 12 20:54:08.656198 env[1159]: time="2024-04-12T20:54:08.655929224Z" level=info msg="StopPodSandbox for \"75b1f9240ec42c34f7487aeeb7e49b76a684ba188e555f09ab5a87cbcf3400da\" returns successfully" Apr 12 20:54:08.656348 env[1159]: time="2024-04-12T20:54:08.656302430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5kpbd,Uid:88da111a-51fe-4923-8dfc-fc1906c3f5c4,Namespace:default,Attempt:1,}" Apr 12 20:54:08.656896 systemd[1]: run-netns-cni\x2de9752b12\x2dd1fd\x2d12da\x2d4eb7\x2d308cba11c683.mount: Deactivated successfully. Apr 12 20:54:08.719611 systemd-networkd[1008]: calic753a0a9d7f: Gained IPv6LL Apr 12 20:54:08.779795 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1114712216.mount: Deactivated successfully. Apr 12 20:54:08.780782 systemd-networkd[1008]: cali0233a595292: Link UP Apr 12 20:54:08.835806 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:54:08.835857 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0233a595292: link becomes ready Apr 12 20:54:08.835952 systemd-networkd[1008]: cali0233a595292: Gained carrier Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.685 [INFO][2792] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0 nginx-deployment-845c78c8b9- default 88da111a-51fe-4923-8dfc-fc1906c3f5c4 2391 0 2024-04-12 20:53:55 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.3 nginx-deployment-845c78c8b9-5kpbd eth0 default [] [] [kns.default ksa.default.default] cali0233a595292 [] []}} ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.686 [INFO][2792] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.741 [INFO][2812] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" HandleID="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Workload="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.754 [INFO][2812] ipam_plugin.go 268: Auto assigning IP ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" HandleID="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Workload="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000326ce0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.3", "pod":"nginx-deployment-845c78c8b9-5kpbd", "timestamp":"2024-04-12 20:54:08.741832884 +0000 UTC"}, Hostname:"10.67.80.3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.754 [INFO][2812] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.754 [INFO][2812] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.754 [INFO][2812] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.3' Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.756 [INFO][2812] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.760 [INFO][2812] ipam.go 372: Looking up existing affinities for host host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.765 [INFO][2812] ipam.go 489: Trying affinity for 192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.767 [INFO][2812] ipam.go 155: Attempting to load block cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.769 [INFO][2812] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.769 [INFO][2812] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.0/26 handle="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.771 [INFO][2812] ipam.go 1682: Creating new handle: k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521 Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.774 [INFO][2812] ipam.go 1203: Writing block in order to claim IPs block=192.168.59.0/26 handle="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.778 [INFO][2812] ipam.go 1216: Successfully claimed IPs: [192.168.59.2/26] block=192.168.59.0/26 handle="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.778 [INFO][2812] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.2/26] handle="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" host="10.67.80.3" Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.778 [INFO][2812] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:54:08.845430 env[1159]: 2024-04-12 20:54:08.778 [INFO][2812] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.59.2/26] IPv6=[] ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" HandleID="k8s-pod-network.e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Workload="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.846016 env[1159]: 2024-04-12 20:54:08.779 [INFO][2792] k8s.go 385: Populated endpoint ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"88da111a-51fe-4923-8dfc-fc1906c3f5c4", ResourceVersion:"2391", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 53, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-5kpbd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0233a595292", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:08.846016 env[1159]: 2024-04-12 20:54:08.779 [INFO][2792] k8s.go 386: Calico CNI using IPs: [192.168.59.2/32] ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.846016 env[1159]: 2024-04-12 20:54:08.779 [INFO][2792] dataplane_linux.go 68: Setting the host side veth name to cali0233a595292 ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.846016 env[1159]: 2024-04-12 20:54:08.835 [INFO][2792] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.846016 env[1159]: 2024-04-12 20:54:08.835 [INFO][2792] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"88da111a-51fe-4923-8dfc-fc1906c3f5c4", ResourceVersion:"2391", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 53, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521", Pod:"nginx-deployment-845c78c8b9-5kpbd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0233a595292", MAC:"f6:ea:45:7d:d9:d8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:08.846016 env[1159]: 2024-04-12 20:54:08.844 [INFO][2792] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521" Namespace="default" Pod="nginx-deployment-845c78c8b9-5kpbd" WorkloadEndpoint="10.67.80.3-k8s-nginx--deployment--845c78c8b9--5kpbd-eth0" Apr 12 20:54:08.851278 env[1159]: time="2024-04-12T20:54:08.851224957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:54:08.851278 env[1159]: time="2024-04-12T20:54:08.851252122Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:54:08.851278 env[1159]: time="2024-04-12T20:54:08.851259787Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:54:08.851411 env[1159]: time="2024-04-12T20:54:08.851339083Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521 pid=2853 runtime=io.containerd.runc.v2 Apr 12 20:54:08.851000 audit[2859]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:08.851000 audit[2859]: SYSCALL arch=c000003e syscall=46 success=yes exit=21560 a0=3 a1=7fff422aba40 a2=0 a3=7fff422aba2c items=0 ppid=2303 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:08.851000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:08.856735 systemd[1]: Started cri-containerd-e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521.scope. Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit: BPF prog-id=93 op=LOAD Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2853 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:08.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383638346635656531616433633538386635626164393539663661 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2853 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:08.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383638346635656531616433633538386635626164393539663661 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit: BPF prog-id=94 op=LOAD Apr 12 20:54:08.861000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d9ad0 items=0 ppid=2853 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:08.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383638346635656531616433633538386635626164393539663661 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit: BPF prog-id=95 op=LOAD Apr 12 20:54:08.861000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d9b18 items=0 ppid=2853 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:08.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383638346635656531616433633538386635626164393539663661 Apr 12 20:54:08.861000 audit: BPF prog-id=95 op=UNLOAD Apr 12 20:54:08.861000 audit: BPF prog-id=94 op=UNLOAD Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:08.861000 audit: BPF prog-id=96 op=LOAD Apr 12 20:54:08.861000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d9f28 items=0 ppid=2853 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:08.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383638346635656531616433633538386635626164393539663661 Apr 12 20:54:08.878770 env[1159]: time="2024-04-12T20:54:08.878745799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5kpbd,Uid:88da111a-51fe-4923-8dfc-fc1906c3f5c4,Namespace:default,Attempt:1,} returns sandbox id \"e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521\"" Apr 12 20:54:08.980539 update_engine[1151]: I0412 20:54:08.980494 1151 update_attempter.cc:509] Updating boot flags... Apr 12 20:54:09.030613 env[1159]: time="2024-04-12T20:54:09.030588296Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:09.031172 env[1159]: time="2024-04-12T20:54:09.031159963Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:09.031833 env[1159]: time="2024-04-12T20:54:09.031806892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:09.032551 env[1159]: time="2024-04-12T20:54:09.032537465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:09.033233 env[1159]: time="2024-04-12T20:54:09.033216950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 20:54:09.033530 env[1159]: time="2024-04-12T20:54:09.033516816Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 20:54:09.034019 env[1159]: time="2024-04-12T20:54:09.034006204Z" level=info msg="CreateContainer within sandbox \"aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 20:54:09.039154 env[1159]: time="2024-04-12T20:54:09.039138157Z" level=info msg="CreateContainer within sandbox \"aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2fc9250f395e63c3bf1062cf11426c4e9932b0c9d9c95f9a330e513c05805b2c\"" Apr 12 20:54:09.039396 env[1159]: time="2024-04-12T20:54:09.039383625Z" level=info msg="StartContainer for \"2fc9250f395e63c3bf1062cf11426c4e9932b0c9d9c95f9a330e513c05805b2c\"" Apr 12 20:54:09.047592 systemd[1]: Started cri-containerd-2fc9250f395e63c3bf1062cf11426c4e9932b0c9d9c95f9a330e513c05805b2c.scope. Apr 12 20:54:09.053000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.053000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdf205dd488 items=0 ppid=2709 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:09.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633932353066333935653633633362663130363263663131343236 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit: BPF prog-id=97 op=LOAD Apr 12 20:54:09.054000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027dba8 items=0 ppid=2709 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:09.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633932353066333935653633633362663130363263663131343236 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit: BPF prog-id=98 op=LOAD Apr 12 20:54:09.054000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027dbf8 items=0 ppid=2709 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:09.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633932353066333935653633633362663130363263663131343236 Apr 12 20:54:09.054000 audit: BPF prog-id=98 op=UNLOAD Apr 12 20:54:09.054000 audit: BPF prog-id=97 op=UNLOAD Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:09.054000 audit: BPF prog-id=99 op=LOAD Apr 12 20:54:09.054000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027dc88 items=0 ppid=2709 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:09.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633932353066333935653633633362663130363263663131343236 Apr 12 20:54:09.061825 env[1159]: time="2024-04-12T20:54:09.061772702Z" level=info msg="StartContainer for \"2fc9250f395e63c3bf1062cf11426c4e9932b0c9d9c95f9a330e513c05805b2c\" returns successfully" Apr 12 20:54:09.360148 kubelet[1560]: E0412 20:54:09.359946 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:10.191642 systemd-networkd[1008]: cali0233a595292: Gained IPv6LL Apr 12 20:54:10.360428 kubelet[1560]: E0412 20:54:10.360367 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:11.245776 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount552807998.mount: Deactivated successfully. Apr 12 20:54:11.360925 kubelet[1560]: E0412 20:54:11.360906 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:11.769974 env[1159]: time="2024-04-12T20:54:11.769928780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:11.770586 env[1159]: time="2024-04-12T20:54:11.770535256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:11.771584 env[1159]: time="2024-04-12T20:54:11.771523291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:11.772432 env[1159]: time="2024-04-12T20:54:11.772373586Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:11.772881 env[1159]: time="2024-04-12T20:54:11.772831712Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 20:54:11.773256 env[1159]: time="2024-04-12T20:54:11.773225316Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 20:54:11.774028 env[1159]: time="2024-04-12T20:54:11.774014996Z" level=info msg="CreateContainer within sandbox \"e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 20:54:11.778486 env[1159]: time="2024-04-12T20:54:11.778442896Z" level=info msg="CreateContainer within sandbox \"e58684f5ee1ad3c588f5bad959f6ab53d0f2cf393b5875a8dcd30e5eb7272521\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"70bc0900db860ecc60ed587ea487e834e80c322f4b5f6eda6a8fb296abb7d98f\"" Apr 12 20:54:11.778698 env[1159]: time="2024-04-12T20:54:11.778686386Z" level=info msg="StartContainer for \"70bc0900db860ecc60ed587ea487e834e80c322f4b5f6eda6a8fb296abb7d98f\"" Apr 12 20:54:11.787210 systemd[1]: Started cri-containerd-70bc0900db860ecc60ed587ea487e834e80c322f4b5f6eda6a8fb296abb7d98f.scope. Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit: BPF prog-id=100 op=LOAD Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2853 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:11.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626330393030646238363065636336306564353837656134383765 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2853 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:11.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626330393030646238363065636336306564353837656134383765 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit: BPF prog-id=101 op=LOAD Apr 12 20:54:11.792000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001e1810 items=0 ppid=2853 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:11.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626330393030646238363065636336306564353837656134383765 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit: BPF prog-id=102 op=LOAD Apr 12 20:54:11.792000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001e1858 items=0 ppid=2853 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:11.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626330393030646238363065636336306564353837656134383765 Apr 12 20:54:11.792000 audit: BPF prog-id=102 op=UNLOAD Apr 12 20:54:11.792000 audit: BPF prog-id=101 op=UNLOAD Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:11.792000 audit: BPF prog-id=103 op=LOAD Apr 12 20:54:11.792000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001e1c68 items=0 ppid=2853 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:11.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626330393030646238363065636336306564353837656134383765 Apr 12 20:54:11.799527 env[1159]: time="2024-04-12T20:54:11.799441130Z" level=info msg="StartContainer for \"70bc0900db860ecc60ed587ea487e834e80c322f4b5f6eda6a8fb296abb7d98f\" returns successfully" Apr 12 20:54:12.361202 kubelet[1560]: E0412 20:54:12.361052 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:12.662291 kubelet[1560]: I0412 20:54:12.662030 1560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-5kpbd" podStartSLOduration=14.768149003 podCreationTimestamp="2024-04-12 20:53:55 +0000 UTC" firstStartedPulling="2024-04-12 20:54:08.879323177 +0000 UTC m=+26.873710074" lastFinishedPulling="2024-04-12 20:54:11.773108895 +0000 UTC m=+29.767495790" observedRunningTime="2024-04-12 20:54:12.661437434 +0000 UTC m=+30.655824389" watchObservedRunningTime="2024-04-12 20:54:12.661934719 +0000 UTC m=+30.656321666" Apr 12 20:54:13.241556 env[1159]: time="2024-04-12T20:54:13.241509886Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:13.242126 env[1159]: time="2024-04-12T20:54:13.242082569Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:13.242890 env[1159]: time="2024-04-12T20:54:13.242839899Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:13.243633 env[1159]: time="2024-04-12T20:54:13.243582526Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:13.244014 env[1159]: time="2024-04-12T20:54:13.243962564Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 20:54:13.245101 env[1159]: time="2024-04-12T20:54:13.245088375Z" level=info msg="CreateContainer within sandbox \"aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 20:54:13.251080 env[1159]: time="2024-04-12T20:54:13.251032066Z" level=info msg="CreateContainer within sandbox \"aacd830f24ed2f4a59905b2606027564f08ef4e79b48ba092106d9a5fc248d31\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c3f849201f1c36d85ffd78f2b8b4ea8eb71ad0d04adad004089dc96fd19e0783\"" Apr 12 20:54:13.251363 env[1159]: time="2024-04-12T20:54:13.251307743Z" level=info msg="StartContainer for \"c3f849201f1c36d85ffd78f2b8b4ea8eb71ad0d04adad004089dc96fd19e0783\"" Apr 12 20:54:13.261144 systemd[1]: Started cri-containerd-c3f849201f1c36d85ffd78f2b8b4ea8eb71ad0d04adad004089dc96fd19e0783.scope. Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.294230 kernel: kauditd_printk_skb: 210 callbacks suppressed Apr 12 20:54:13.294266 kernel: audit: type=1400 audit(1712955253.267:729): avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6c2fb880a8 items=0 ppid=2709 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:13.361574 kubelet[1560]: E0412 20:54:13.361521 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:13.449434 kernel: audit: type=1300 audit(1712955253.267:729): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6c2fb880a8 items=0 ppid=2709 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:13.449505 kernel: audit: type=1327 audit(1712955253.267:729): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663834393230316631633336643835666664373866326238623465 Apr 12 20:54:13.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663834393230316631633336643835666664373866326238623465 Apr 12 20:54:13.538990 kernel: audit: type=1400 audit(1712955253.267:730): avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.600416 kernel: audit: type=1400 audit(1712955253.267:730): avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.661997 kernel: audit: type=1400 audit(1712955253.267:730): avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.722840 kernel: audit: type=1400 audit(1712955253.267:730): avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.728547 env[1159]: time="2024-04-12T20:54:13.728513372Z" level=info msg="StartContainer for \"c3f849201f1c36d85ffd78f2b8b4ea8eb71ad0d04adad004089dc96fd19e0783\" returns successfully" Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.845820 kernel: audit: type=1400 audit(1712955253.267:730): avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.845851 kernel: audit: type=1400 audit(1712955253.267:730): avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.907633 kernel: audit: type=1400 audit(1712955253.267:730): avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.267000 audit: BPF prog-id=104 op=LOAD Apr 12 20:54:13.267000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8f88 items=0 ppid=2709 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:13.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663834393230316631633336643835666664373866326238623465 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.355000 audit: BPF prog-id=105 op=LOAD Apr 12 20:54:13.355000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8fd8 items=0 ppid=2709 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:13.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663834393230316631633336643835666664373866326238623465 Apr 12 20:54:13.538000 audit: BPF prog-id=105 op=UNLOAD Apr 12 20:54:13.538000 audit: BPF prog-id=104 op=UNLOAD Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:13.538000 audit: BPF prog-id=106 op=LOAD Apr 12 20:54:13.538000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9068 items=0 ppid=2709 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:13.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663834393230316631633336643835666664373866326238623465 Apr 12 20:54:14.362045 kubelet[1560]: E0412 20:54:14.361935 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:14.453093 kubelet[1560]: I0412 20:54:14.453034 1560 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 20:54:14.453377 kubelet[1560]: I0412 20:54:14.453119 1560 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 20:54:14.679212 kubelet[1560]: I0412 20:54:14.679142 1560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-wz7gr" podStartSLOduration=26.978334442 podCreationTimestamp="2024-04-12 20:53:42 +0000 UTC" firstStartedPulling="2024-04-12 20:54:07.543437383 +0000 UTC m=+25.537824278" lastFinishedPulling="2024-04-12 20:54:13.2441549 +0000 UTC m=+31.238541796" observedRunningTime="2024-04-12 20:54:14.678643453 +0000 UTC m=+32.673030422" watchObservedRunningTime="2024-04-12 20:54:14.67905196 +0000 UTC m=+32.673438908" Apr 12 20:54:15.362470 kubelet[1560]: E0412 20:54:15.362358 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:16.363596 kubelet[1560]: E0412 20:54:16.363518 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:17.363793 kubelet[1560]: E0412 20:54:17.363681 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:18.064000 audit[3061]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:18.064000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe32331a50 a2=0 a3=7ffe32331a3c items=0 ppid=1723 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:18.066833 kubelet[1560]: I0412 20:54:18.066792 1560 topology_manager.go:212] "Topology Admit Handler" Apr 12 20:54:18.069552 systemd[1]: Created slice kubepods-besteffort-pod0feeb499_08f6_4f68_b23a_6ce586ae3aa9.slice. Apr 12 20:54:18.084000 audit[3061]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:18.084000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe32331a50 a2=0 a3=0 items=0 ppid=1723 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:18.102000 audit[3065]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:18.102000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc51e662a0 a2=0 a3=7ffc51e6628c items=0 ppid=1723 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:18.114000 audit[3065]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:18.114000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc51e662a0 a2=0 a3=0 items=0 ppid=1723 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:18.208828 kubelet[1560]: I0412 20:54:18.208706 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sdnhn\" (UniqueName: \"kubernetes.io/projected/0feeb499-08f6-4f68-b23a-6ce586ae3aa9-kube-api-access-sdnhn\") pod \"nfs-server-provisioner-0\" (UID: \"0feeb499-08f6-4f68-b23a-6ce586ae3aa9\") " pod="default/nfs-server-provisioner-0" Apr 12 20:54:18.209144 kubelet[1560]: I0412 20:54:18.208916 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0feeb499-08f6-4f68-b23a-6ce586ae3aa9-data\") pod \"nfs-server-provisioner-0\" (UID: \"0feeb499-08f6-4f68-b23a-6ce586ae3aa9\") " pod="default/nfs-server-provisioner-0" Apr 12 20:54:18.364576 kubelet[1560]: E0412 20:54:18.364353 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:18.372011 env[1159]: time="2024-04-12T20:54:18.371884858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0feeb499-08f6-4f68-b23a-6ce586ae3aa9,Namespace:default,Attempt:0,}" Apr 12 20:54:18.562100 systemd-networkd[1008]: cali60e51b789ff: Link UP Apr 12 20:54:18.619077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:54:18.619154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 20:54:18.619229 systemd-networkd[1008]: cali60e51b789ff: Gained carrier Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.430 [INFO][3067] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.3-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0feeb499-08f6-4f68-b23a-6ce586ae3aa9 2451 0 2024-04-12 20:54:18 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.3 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.430 [INFO][3067] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.488 [INFO][3088] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" HandleID="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Workload="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.514 [INFO][3088] ipam_plugin.go 268: Auto assigning IP ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" HandleID="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Workload="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000342f80), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.3", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 20:54:18.488679204 +0000 UTC"}, Hostname:"10.67.80.3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.514 [INFO][3088] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.514 [INFO][3088] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.514 [INFO][3088] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.3' Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.518 [INFO][3088] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.525 [INFO][3088] ipam.go 372: Looking up existing affinities for host host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.534 [INFO][3088] ipam.go 489: Trying affinity for 192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.537 [INFO][3088] ipam.go 155: Attempting to load block cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.541 [INFO][3088] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.541 [INFO][3088] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.0/26 handle="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.543 [INFO][3088] ipam.go 1682: Creating new handle: k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24 Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.548 [INFO][3088] ipam.go 1203: Writing block in order to claim IPs block=192.168.59.0/26 handle="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.553 [INFO][3088] ipam.go 1216: Successfully claimed IPs: [192.168.59.3/26] block=192.168.59.0/26 handle="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.553 [INFO][3088] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.3/26] handle="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" host="10.67.80.3" Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.553 [INFO][3088] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:54:18.634399 env[1159]: 2024-04-12 20:54:18.553 [INFO][3088] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.59.3/26] IPv6=[] ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" HandleID="k8s-pod-network.094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Workload="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" Apr 12 20:54:18.634923 env[1159]: 2024-04-12 20:54:18.557 [INFO][3067] k8s.go 385: Populated endpoint ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0feeb499-08f6-4f68-b23a-6ce586ae3aa9", ResourceVersion:"2451", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.59.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:18.634923 env[1159]: 2024-04-12 20:54:18.557 [INFO][3067] k8s.go 386: Calico CNI using IPs: [192.168.59.3/32] ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" Apr 12 20:54:18.634923 env[1159]: 2024-04-12 20:54:18.557 [INFO][3067] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" Apr 12 20:54:18.634923 env[1159]: 2024-04-12 20:54:18.619 [INFO][3067] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" Apr 12 20:54:18.635058 env[1159]: 2024-04-12 20:54:18.619 [INFO][3067] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0feeb499-08f6-4f68-b23a-6ce586ae3aa9", ResourceVersion:"2451", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.59.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"a2:b8:82:47:3f:80", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:18.635058 env[1159]: 2024-04-12 20:54:18.633 [INFO][3067] k8s.go 498: Wrote updated endpoint to datastore ContainerID="094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.3-k8s-nfs--server--provisioner--0-eth0" Apr 12 20:54:18.640152 env[1159]: time="2024-04-12T20:54:18.640116800Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:54:18.640152 env[1159]: time="2024-04-12T20:54:18.640137242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:54:18.640152 env[1159]: time="2024-04-12T20:54:18.640143909Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:54:18.640301 env[1159]: time="2024-04-12T20:54:18.640205803Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24 pid=3131 runtime=io.containerd.runc.v2 Apr 12 20:54:18.640000 audit[3142]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:18.646500 systemd[1]: Started cri-containerd-094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24.scope. Apr 12 20:54:18.668158 kernel: kauditd_printk_skb: 45 callbacks suppressed Apr 12 20:54:18.668203 kernel: audit: type=1325 audit(1712955258.640:739): table=filter:75 family=2 entries=38 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:18.640000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffaf029670 a2=0 a3=7fffaf02965c items=0 ppid=2303 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.726316 kernel: audit: type=1300 audit(1712955258.640:739): arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffaf029670 a2=0 a3=7fffaf02965c items=0 ppid=2303 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.640000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:18.881040 kernel: audit: type=1327 audit(1712955258.640:739): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:18.881081 kernel: audit: type=1400 audit(1712955258.732:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.942846 kernel: audit: type=1400 audit(1712955258.732:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.004570 kernel: audit: type=1400 audit(1712955258.732:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.066307 kernel: audit: type=1400 audit(1712955258.732:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.128401 kernel: audit: type=1400 audit(1712955258.732:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.190522 kernel: audit: type=1400 audit(1712955258.732:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.252573 kernel: audit: type=1400 audit(1712955258.732:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.879000 audit: BPF prog-id=107 op=LOAD Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3131 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346635353237656230653966396361666638666263353434636261 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3131 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346635353237656230653966396361666638666263353434636261 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:18.880000 audit: BPF prog-id=108 op=LOAD Apr 12 20:54:18.880000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00027f630 items=0 ppid=3131 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:18.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346635353237656230653966396361666638666263353434636261 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.003000 audit: BPF prog-id=109 op=LOAD Apr 12 20:54:19.003000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00027f678 items=0 ppid=3131 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:19.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346635353237656230653966396361666638666263353434636261 Apr 12 20:54:19.127000 audit: BPF prog-id=109 op=UNLOAD Apr 12 20:54:19.127000 audit: BPF prog-id=108 op=UNLOAD Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:19.127000 audit: BPF prog-id=110 op=LOAD Apr 12 20:54:19.127000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00027fa88 items=0 ppid=3131 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:19.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039346635353237656230653966396361666638666263353434636261 Apr 12 20:54:19.330479 env[1159]: time="2024-04-12T20:54:19.330455236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0feeb499-08f6-4f68-b23a-6ce586ae3aa9,Namespace:default,Attempt:0,} returns sandbox id \"094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24\"" Apr 12 20:54:19.331222 env[1159]: time="2024-04-12T20:54:19.331208611Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 20:54:19.365346 kubelet[1560]: E0412 20:54:19.365263 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:20.365883 kubelet[1560]: E0412 20:54:20.365819 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:20.495461 systemd-networkd[1008]: cali60e51b789ff: Gained IPv6LL Apr 12 20:54:21.365934 kubelet[1560]: E0412 20:54:21.365889 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:21.811101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1236380252.mount: Deactivated successfully. Apr 12 20:54:22.344746 kubelet[1560]: E0412 20:54:22.344702 1560 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:22.366973 kubelet[1560]: E0412 20:54:22.366930 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:22.978123 env[1159]: time="2024-04-12T20:54:22.978080480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:22.979234 env[1159]: time="2024-04-12T20:54:22.979216468Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:22.980409 env[1159]: time="2024-04-12T20:54:22.980385621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:22.981354 env[1159]: time="2024-04-12T20:54:22.981341088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:22.981779 env[1159]: time="2024-04-12T20:54:22.981764201Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 20:54:22.983074 env[1159]: time="2024-04-12T20:54:22.983060970Z" level=info msg="CreateContainer within sandbox \"094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 20:54:22.987286 env[1159]: time="2024-04-12T20:54:22.987267085Z" level=info msg="CreateContainer within sandbox \"094f5527eb0e9f9caff8fbc544cbaa537e8c96edaeaee3049c4c5a92b0c57b24\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"82330bab5161342b1115c7921635e21358151f8bf025f3c09eacbf66d840e951\"" Apr 12 20:54:22.987692 env[1159]: time="2024-04-12T20:54:22.987615826Z" level=info msg="StartContainer for \"82330bab5161342b1115c7921635e21358151f8bf025f3c09eacbf66d840e951\"" Apr 12 20:54:22.998114 systemd[1]: Started cri-containerd-82330bab5161342b1115c7921635e21358151f8bf025f3c09eacbf66d840e951.scope. Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit: BPF prog-id=111 op=LOAD Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3131 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:23.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832333330626162353136313334326231313135633739323136333565 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3131 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:23.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832333330626162353136313334326231313135633739323136333565 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit: BPF prog-id=112 op=LOAD Apr 12 20:54:23.002000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dc020 items=0 ppid=3131 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:23.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832333330626162353136313334326231313135633739323136333565 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit: BPF prog-id=113 op=LOAD Apr 12 20:54:23.002000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003dc068 items=0 ppid=3131 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:23.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832333330626162353136313334326231313135633739323136333565 Apr 12 20:54:23.002000 audit: BPF prog-id=113 op=UNLOAD Apr 12 20:54:23.002000 audit: BPF prog-id=112 op=UNLOAD Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:23.002000 audit: BPF prog-id=114 op=LOAD Apr 12 20:54:23.002000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dc478 items=0 ppid=3131 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:23.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832333330626162353136313334326231313135633739323136333565 Apr 12 20:54:23.009837 env[1159]: time="2024-04-12T20:54:23.009810716Z" level=info msg="StartContainer for \"82330bab5161342b1115c7921635e21358151f8bf025f3c09eacbf66d840e951\" returns successfully" Apr 12 20:54:23.034000 audit[3212]: AVC avc: denied { search } for pid=3212 comm="rpcbind" name="crypto" dev="proc" ino=28446 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 20:54:23.034000 audit[3212]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f918dcf60c0 a2=0 a3=0 items=0 ppid=3194 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 key=(null) Apr 12 20:54:23.034000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 20:54:23.053000 audit[3217]: AVC avc: denied { search } for pid=3217 comm="dbus-daemon" name="crypto" dev="proc" ino=28446 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 20:54:23.053000 audit[3217]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f7e0af530c0 a2=0 a3=0 items=0 ppid=3194 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 key=(null) Apr 12 20:54:23.053000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 20:54:23.055000 audit[3218]: AVC avc: denied { watch } for pid=3218 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538111 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c330,c670 tclass=dir permissive=0 Apr 12 20:54:23.055000 audit[3218]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55c1644fc0b0 a2=2c8 a3=7ffe5dfe695c items=0 ppid=3194 pid=3218 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 key=(null) Apr 12 20:54:23.055000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 20:54:23.057000 audit[3219]: AVC avc: denied { read } for pid=3219 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=8832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 20:54:23.057000 audit[3219]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f1aecff2320 a1=80000 a2=d a3=7ffc65828f20 items=0 ppid=3194 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 key=(null) Apr 12 20:54:23.057000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 20:54:23.057000 audit[3219]: AVC avc: denied { search } for pid=3219 comm="ganesha.nfsd" name="crypto" dev="proc" ino=28446 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 20:54:23.057000 audit[3219]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1aec5460c0 a2=0 a3=0 items=0 ppid=3194 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c670 key=(null) Apr 12 20:54:23.057000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 20:54:23.368028 kubelet[1560]: E0412 20:54:23.367808 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:23.690826 kubelet[1560]: I0412 20:54:23.690732 1560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.039757021 podCreationTimestamp="2024-04-12 20:54:18 +0000 UTC" firstStartedPulling="2024-04-12 20:54:19.331083412 +0000 UTC m=+37.325470305" lastFinishedPulling="2024-04-12 20:54:22.981986965 +0000 UTC m=+40.976373865" observedRunningTime="2024-04-12 20:54:23.690371037 +0000 UTC m=+41.684758018" watchObservedRunningTime="2024-04-12 20:54:23.690660581 +0000 UTC m=+41.685047518" Apr 12 20:54:23.699000 audit[3237]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:23.727622 kernel: kauditd_printk_skb: 122 callbacks suppressed Apr 12 20:54:23.727658 kernel: audit: type=1325 audit(1712955263.699:781): table=filter:76 family=2 entries=20 op=nft_register_rule pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:23.699000 audit[3237]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffddcbecd0 a2=0 a3=7fffddcbecbc items=0 ppid=1723 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:23.885638 kernel: audit: type=1300 audit(1712955263.699:781): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffddcbecd0 a2=0 a3=7fffddcbecbc items=0 ppid=1723 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:23.885712 kernel: audit: type=1327 audit(1712955263.699:781): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:23.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:23.947000 audit[3237]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:23.947000 audit[3237]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffddcbecd0 a2=0 a3=7fffddcbecbc items=0 ppid=1723 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:24.103537 kernel: audit: type=1325 audit(1712955263.947:782): table=nat:77 family=2 entries=106 op=nft_register_chain pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:54:24.103567 kernel: audit: type=1300 audit(1712955263.947:782): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffddcbecd0 a2=0 a3=7fffddcbecbc items=0 ppid=1723 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:24.103583 kernel: audit: type=1327 audit(1712955263.947:782): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:23.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:54:24.368963 kubelet[1560]: E0412 20:54:24.368778 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:25.369257 kubelet[1560]: E0412 20:54:25.369130 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:26.369638 kubelet[1560]: E0412 20:54:26.369525 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:27.370394 kubelet[1560]: E0412 20:54:27.370284 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:28.371657 kubelet[1560]: E0412 20:54:28.371552 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:29.372614 kubelet[1560]: E0412 20:54:29.372504 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:30.373402 kubelet[1560]: E0412 20:54:30.373295 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:31.374358 kubelet[1560]: E0412 20:54:31.374244 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:32.307902 kubelet[1560]: I0412 20:54:32.307801 1560 topology_manager.go:212] "Topology Admit Handler" Apr 12 20:54:32.320808 systemd[1]: Created slice kubepods-besteffort-pod34ce3d4f_7e41_4a75_a8d5_b231cec00ae6.slice. Apr 12 20:54:32.375108 kubelet[1560]: E0412 20:54:32.374994 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:32.502732 kubelet[1560]: I0412 20:54:32.502648 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f7ad0255-5dee-4077-9ba7-1fa65cb0f5c3\" (UniqueName: \"kubernetes.io/nfs/34ce3d4f-7e41-4a75-a8d5-b231cec00ae6-pvc-f7ad0255-5dee-4077-9ba7-1fa65cb0f5c3\") pod \"test-pod-1\" (UID: \"34ce3d4f-7e41-4a75-a8d5-b231cec00ae6\") " pod="default/test-pod-1" Apr 12 20:54:32.503083 kubelet[1560]: I0412 20:54:32.502805 1560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8d69q\" (UniqueName: \"kubernetes.io/projected/34ce3d4f-7e41-4a75-a8d5-b231cec00ae6-kube-api-access-8d69q\") pod \"test-pod-1\" (UID: \"34ce3d4f-7e41-4a75-a8d5-b231cec00ae6\") " pod="default/test-pod-1" Apr 12 20:54:32.614000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.728881 kernel: Failed to create system directory netfs Apr 12 20:54:32.728931 kernel: audit: type=1400 audit(1712955272.614:783): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.728950 kernel: Failed to create system directory netfs Apr 12 20:54:32.728961 kernel: audit: type=1400 audit(1712955272.614:783): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.614000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.754306 kernel: Failed to create system directory netfs Apr 12 20:54:32.839005 kernel: audit: type=1400 audit(1712955272.614:783): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.614000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.864137 kernel: Failed to create system directory netfs Apr 12 20:54:32.949373 kernel: audit: type=1400 audit(1712955272.614:783): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.614000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:32.614000 audit[3262]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5639393275e0 a1=153bc a2=56393902a2b0 a3=5 items=0 ppid=9 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:33.153087 kernel: audit: type=1300 audit(1712955272.614:783): arch=c000003e syscall=175 success=yes exit=0 a0=5639393275e0 a1=153bc a2=56393902a2b0 a3=5 items=0 ppid=9 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:33.153121 kernel: audit: type=1327 audit(1712955272.614:783): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 20:54:32.614000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.210368 kernel: Failed to create system directory fscache Apr 12 20:54:33.210396 kernel: audit: type=1400 audit(1712955273.074:784): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.210414 kernel: Failed to create system directory fscache Apr 12 20:54:33.294574 kernel: audit: type=1400 audit(1712955273.074:784): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.375379 kubelet[1560]: E0412 20:54:33.375336 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.403324 kernel: Failed to create system directory fscache Apr 12 20:54:33.403378 kernel: audit: type=1400 audit(1712955273.074:784): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.510868 kernel: Failed to create system directory fscache Apr 12 20:54:33.510896 kernel: audit: type=1400 audit(1712955273.074:784): avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.641128 kernel: Failed to create system directory fscache Apr 12 20:54:33.641188 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.664914 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.688400 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.711650 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.734442 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.756469 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.778134 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.799250 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.819914 kernel: Failed to create system directory fscache Apr 12 20:54:33.074000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.074000 audit[3262]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56393953c9c0 a1=4c0fc a2=56393902a2b0 a3=5 items=0 ppid=9 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:33.074000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 20:54:33.860259 kernel: FS-Cache: Loaded Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.921130 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.921197 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.921211 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.940106 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.958640 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.977033 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.995034 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.012640 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.029765 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.046764 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.063347 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.079561 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.095266 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.110967 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.126447 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.141227 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.155542 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.169467 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.182910 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.195902 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.208485 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.220674 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.232521 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.243907 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.254855 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.265650 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.276067 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.286021 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.295566 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.304915 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.313920 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.322483 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.330596 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.338557 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.346144 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.353287 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.366502 kernel: Failed to create system directory sunrpc Apr 12 20:54:34.366525 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.373034 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.376288 kubelet[1560]: E0412 20:54:34.376242 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:34.379566 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.386090 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.392597 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.399139 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.405637 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.412164 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.418681 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.425205 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.431577 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.437826 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.444083 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.450341 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.456623 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.462846 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.469114 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.475361 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.481591 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.487840 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.494082 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.500280 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.506553 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.512789 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.519012 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.525222 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.531439 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.537662 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.543909 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.550129 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.556351 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.568866 kernel: Failed to create system directory sunrpc Apr 12 20:54:34.568893 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.575097 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.581290 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.587531 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.593790 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.600001 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.606234 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.612514 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.618763 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.625001 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.631227 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.637461 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.643694 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.649944 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.656179 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.662415 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.668652 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.674880 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.681114 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.687366 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.693600 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.699830 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.706063 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.712282 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.718524 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.724747 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.730988 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.737192 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.743446 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.749687 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.755930 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.762150 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.768387 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.774613 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.780841 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.787074 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.799563 kernel: Failed to create system directory sunrpc Apr 12 20:54:34.799606 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.805785 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.812019 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.818284 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.824526 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.830751 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.837006 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.843233 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.849481 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.855715 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.861954 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.868207 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.874437 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.880691 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.886930 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.893154 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.899411 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.905655 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.911879 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.918107 kernel: Failed to create system directory sunrpc Apr 12 20:54:33.873000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.944046 kernel: RPC: Registered named UNIX socket transport module. Apr 12 20:54:34.944075 kernel: RPC: Registered udp transport module. Apr 12 20:54:34.944088 kernel: RPC: Registered tcp transport module. Apr 12 20:54:34.950330 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 20:54:33.873000 audit[3262]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563939588ad0 a1=1a7e9c a2=56393902a2b0 a3=5 items=6 ppid=9 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:33.873000 audit: CWD cwd="/" Apr 12 20:54:33.873000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:54:33.873000 audit: PATH item=1 name=(null) inode=29142 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:54:33.873000 audit: PATH item=2 name=(null) inode=29142 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:54:33.873000 audit: PATH item=3 name=(null) inode=29143 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:54:33.873000 audit: PATH item=4 name=(null) inode=29142 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:54:33.873000 audit: PATH item=5 name=(null) inode=29144 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:54:33.873000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.998376 kernel: Failed to create system directory nfs Apr 12 20:54:34.998439 kernel: Failed to create system directory nfs Apr 12 20:54:34.998454 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.004986 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.011607 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.018233 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.024866 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.031498 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.038127 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.044761 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.051381 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.058007 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.064639 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.071294 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.084545 kernel: Failed to create system directory nfs Apr 12 20:54:35.084609 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.091147 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.097789 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.104439 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.111039 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.117668 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.124275 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.130922 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.137566 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.144181 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.150828 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.157457 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.164088 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.170705 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.177349 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.183958 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.190582 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.197220 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.203855 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.210483 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.217111 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.223742 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.230386 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.237021 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.243651 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.250257 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.256902 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.263529 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.270166 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.276598 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.282914 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.289233 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.295421 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.301401 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.307368 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.313343 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.319400 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.325440 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.331489 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.337447 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.343409 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.349336 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.355303 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.361266 kernel: Failed to create system directory nfs Apr 12 20:54:34.979000 audit[3262]: AVC avc: denied { confidentiality } for pid=3262 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.376502 kubelet[1560]: E0412 20:54:35.376463 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:34.979000 audit[3262]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5639397a9670 a1=16d85c a2=56393902a2b0 a3=5 items=0 ppid=9 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:34.979000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 20:54:35.386324 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.425287 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.425331 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.425343 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.431590 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.437922 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.444224 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.450555 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.456901 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.463211 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.469574 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.475906 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.482233 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.488558 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.494922 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.501286 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.507591 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.513936 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.520315 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.526597 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.532927 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.539304 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.545603 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.551902 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.558228 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.564562 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.570885 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.577203 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.583554 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.589879 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.596188 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.602520 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.608853 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.615157 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.621475 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.627858 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.634259 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.640539 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.646883 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.653209 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.659541 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.665887 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.672227 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.678565 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.684885 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.691225 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.697588 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.703931 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.710117 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.716208 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.722243 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.728365 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.734432 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.740483 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.746528 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.752571 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.758612 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.764662 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.770671 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.776700 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.782735 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.788762 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.794792 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.800833 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.806832 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.812844 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.818859 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.824891 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.830913 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.836909 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.842877 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.848868 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.854856 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.860864 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.866816 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.872799 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.878797 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.884767 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.890735 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.896698 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.902636 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.908612 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.914546 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.920526 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.926456 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.932409 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.938358 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.944275 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.950267 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.956211 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.962129 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.968093 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.974028 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.979967 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:35.985894 kernel: Failed to create system directory nfs4 Apr 12 20:54:35.404000 audit[3268]: AVC avc: denied { confidentiality } for pid=3268 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.077042 kernel: NFS: Registering the id_resolver key type Apr 12 20:54:36.077066 kernel: Key type id_resolver registered Apr 12 20:54:36.077084 kernel: Key type id_legacy registered Apr 12 20:54:35.404000 audit[3268]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f81e1b78010 a1=208ac4 a2=558b7eee12b0 a3=5 items=0 ppid=9 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:35.404000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.104519 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.104549 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.104562 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.111128 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.117794 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.124478 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.131123 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.137775 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.144496 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.151116 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.157824 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.164485 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.171149 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.177790 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.184429 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.191057 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.197705 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.204379 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.211017 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.217707 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.224439 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.231093 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.237784 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.244520 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.251194 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.257866 kernel: Failed to create system directory rpcgss Apr 12 20:54:36.088000 audit[3269]: AVC avc: denied { confidentiality } for pid=3269 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 20:54:36.088000 audit[3269]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f903676c010 a1=70c3c a2=56449ca7e2b0 a3=5 items=0 ppid=9 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:36.088000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 20:54:36.376680 kubelet[1560]: E0412 20:54:36.376630 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:36.588938 nfsidmap[3278]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-672e0e0c9d' Apr 12 20:54:36.657462 nfsidmap[3305]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-672e0e0c9d' Apr 12 20:54:36.684000 audit[1211]: AVC avc: denied { watch_reads } for pid=1211 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 20:54:36.684000 audit[1211]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5594d7373670 a2=10 a3=fb1427599a36fb4b items=0 ppid=1 pid=1211 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:36.684000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 20:54:36.684000 audit[1211]: AVC avc: denied { watch_reads } for pid=1211 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 20:54:36.684000 audit[1211]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5594d7373670 a2=10 a3=fb1427599a36fb4b items=0 ppid=1 pid=1211 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:36.684000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 20:54:36.684000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 20:54:36.684000 audit[1211]: AVC avc: denied { watch_reads } for pid=1211 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 20:54:36.684000 audit[1211]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5594d7373670 a2=10 a3=fb1427599a36fb4b items=0 ppid=1 pid=1211 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:36.684000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 20:54:36.684000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 20:54:36.684000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 20:54:36.827539 env[1159]: time="2024-04-12T20:54:36.827417896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:34ce3d4f-7e41-4a75-a8d5-b231cec00ae6,Namespace:default,Attempt:0,}" Apr 12 20:54:37.002275 systemd-networkd[1008]: cali5ec59c6bf6e: Link UP Apr 12 20:54:37.020083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:54:37.020152 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 20:54:37.020285 systemd-networkd[1008]: cali5ec59c6bf6e: Gained carrier Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.866 [INFO][3307] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.3-k8s-test--pod--1-eth0 default 34ce3d4f-7e41-4a75-a8d5-b231cec00ae6 2508 0 2024-04-12 20:54:18 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.3 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.867 [INFO][3307] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-eth0" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.921 [INFO][3326] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" HandleID="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Workload="10.67.80.3-k8s-test--pod--1-eth0" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.941 [INFO][3326] ipam_plugin.go 268: Auto assigning IP ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" HandleID="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Workload="10.67.80.3-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002aa3b0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.3", "pod":"test-pod-1", "timestamp":"2024-04-12 20:54:36.921122939 +0000 UTC"}, Hostname:"10.67.80.3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.941 [INFO][3326] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.941 [INFO][3326] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.942 [INFO][3326] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.3' Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.945 [INFO][3326] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.954 [INFO][3326] ipam.go 372: Looking up existing affinities for host host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.963 [INFO][3326] ipam.go 489: Trying affinity for 192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.968 [INFO][3326] ipam.go 155: Attempting to load block cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.974 [INFO][3326] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.0/26 host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.974 [INFO][3326] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.0/26 handle="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.978 [INFO][3326] ipam.go 1682: Creating new handle: k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402 Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.986 [INFO][3326] ipam.go 1203: Writing block in order to claim IPs block=192.168.59.0/26 handle="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.995 [INFO][3326] ipam.go 1216: Successfully claimed IPs: [192.168.59.4/26] block=192.168.59.0/26 handle="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.995 [INFO][3326] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.4/26] handle="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" host="10.67.80.3" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.995 [INFO][3326] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.995 [INFO][3326] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.59.4/26] IPv6=[] ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" HandleID="k8s-pod-network.79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Workload="10.67.80.3-k8s-test--pod--1-eth0" Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.998 [INFO][3307] k8s.go 385: Populated endpoint ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"34ce3d4f-7e41-4a75-a8d5-b231cec00ae6", ResourceVersion:"2508", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:37.025507 env[1159]: 2024-04-12 20:54:36.998 [INFO][3307] k8s.go 386: Calico CNI using IPs: [192.168.59.4/32] ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-eth0" Apr 12 20:54:37.025990 env[1159]: 2024-04-12 20:54:36.999 [INFO][3307] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-eth0" Apr 12 20:54:37.025990 env[1159]: 2024-04-12 20:54:37.020 [INFO][3307] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-eth0" Apr 12 20:54:37.025990 env[1159]: 2024-04-12 20:54:37.020 [INFO][3307] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.3-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"34ce3d4f-7e41-4a75-a8d5-b231cec00ae6", ResourceVersion:"2508", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 54, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.3", ContainerID:"79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"22:2c:0b:9f:14:83", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:54:37.025990 env[1159]: 2024-04-12 20:54:37.024 [INFO][3307] k8s.go 498: Wrote updated endpoint to datastore ContainerID="79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.3-k8s-test--pod--1-eth0" Apr 12 20:54:37.030924 env[1159]: time="2024-04-12T20:54:37.030887949Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:54:37.030924 env[1159]: time="2024-04-12T20:54:37.030909638Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:54:37.030924 env[1159]: time="2024-04-12T20:54:37.030916810Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:54:37.031071 env[1159]: time="2024-04-12T20:54:37.030985311Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402 pid=3361 runtime=io.containerd.runc.v2 Apr 12 20:54:37.030000 audit[3360]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3360 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:54:37.030000 audit[3360]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffc7fd62460 a2=0 a3=7ffc7fd6244c items=0 ppid=2303 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.030000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:54:37.036646 systemd[1]: Started cri-containerd-79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402.scope. Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit: BPF prog-id=115 op=LOAD Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3361 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739646237643863333036396462626637303363663861633735343031 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3361 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739646237643863333036396462626637303363663861633735343031 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit: BPF prog-id=116 op=LOAD Apr 12 20:54:37.042000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001c4a20 items=0 ppid=3361 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739646237643863333036396462626637303363663861633735343031 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit: BPF prog-id=117 op=LOAD Apr 12 20:54:37.042000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001c4a68 items=0 ppid=3361 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739646237643863333036396462626637303363663861633735343031 Apr 12 20:54:37.042000 audit: BPF prog-id=117 op=UNLOAD Apr 12 20:54:37.042000 audit: BPF prog-id=116 op=UNLOAD Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.042000 audit: BPF prog-id=118 op=LOAD Apr 12 20:54:37.042000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001c4e78 items=0 ppid=3361 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739646237643863333036396462626637303363663861633735343031 Apr 12 20:54:37.058680 env[1159]: time="2024-04-12T20:54:37.058658015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:34ce3d4f-7e41-4a75-a8d5-b231cec00ae6,Namespace:default,Attempt:0,} returns sandbox id \"79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402\"" Apr 12 20:54:37.059395 env[1159]: time="2024-04-12T20:54:37.059382820Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 20:54:37.377039 kubelet[1560]: E0412 20:54:37.376867 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:37.446980 env[1159]: time="2024-04-12T20:54:37.446861529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:37.449086 env[1159]: time="2024-04-12T20:54:37.448994151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:37.453568 env[1159]: time="2024-04-12T20:54:37.453473336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:37.457998 env[1159]: time="2024-04-12T20:54:37.457897865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:54:37.460132 env[1159]: time="2024-04-12T20:54:37.460013051Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 20:54:37.464043 env[1159]: time="2024-04-12T20:54:37.463967926Z" level=info msg="CreateContainer within sandbox \"79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 20:54:37.477801 env[1159]: time="2024-04-12T20:54:37.477707714Z" level=info msg="CreateContainer within sandbox \"79db7d8c3069dbbf703cf8ac754017e94f5e58381b45cf60a3f0e4b8b6528402\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b112bb02b810a1a8e6f6cac7a8a7e4b3d2a2e5e227cf7b2bd164aec2ebbe9cb0\"" Apr 12 20:54:37.478611 env[1159]: time="2024-04-12T20:54:37.478537702Z" level=info msg="StartContainer for \"b112bb02b810a1a8e6f6cac7a8a7e4b3d2a2e5e227cf7b2bd164aec2ebbe9cb0\"" Apr 12 20:54:37.485361 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount264179909.mount: Deactivated successfully. Apr 12 20:54:37.499463 systemd[1]: Started cri-containerd-b112bb02b810a1a8e6f6cac7a8a7e4b3d2a2e5e227cf7b2bd164aec2ebbe9cb0.scope. Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit: BPF prog-id=119 op=LOAD Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3361 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313262623032623831306131613865366636636163376138613765 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3361 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313262623032623831306131613865366636636163376138613765 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit: BPF prog-id=120 op=LOAD Apr 12 20:54:37.504000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097af0 items=0 ppid=3361 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313262623032623831306131613865366636636163376138613765 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit: BPF prog-id=121 op=LOAD Apr 12 20:54:37.504000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097b38 items=0 ppid=3361 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313262623032623831306131613865366636636163376138613765 Apr 12 20:54:37.504000 audit: BPF prog-id=121 op=UNLOAD Apr 12 20:54:37.504000 audit: BPF prog-id=120 op=UNLOAD Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:54:37.504000 audit: BPF prog-id=122 op=LOAD Apr 12 20:54:37.504000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000097f48 items=0 ppid=3361 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:54:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313262623032623831306131613865366636636163376138613765 Apr 12 20:54:37.510564 env[1159]: time="2024-04-12T20:54:37.510539840Z" level=info msg="StartContainer for \"b112bb02b810a1a8e6f6cac7a8a7e4b3d2a2e5e227cf7b2bd164aec2ebbe9cb0\" returns successfully" Apr 12 20:54:37.737800 kubelet[1560]: I0412 20:54:37.737697 1560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.336472642 podCreationTimestamp="2024-04-12 20:54:18 +0000 UTC" firstStartedPulling="2024-04-12 20:54:37.059250624 +0000 UTC m=+55.053637517" lastFinishedPulling="2024-04-12 20:54:37.460390368 +0000 UTC m=+55.454777332" observedRunningTime="2024-04-12 20:54:37.737076894 +0000 UTC m=+55.731463851" watchObservedRunningTime="2024-04-12 20:54:37.737612457 +0000 UTC m=+55.731999393" Apr 12 20:54:38.377401 kubelet[1560]: E0412 20:54:38.377288 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:38.607869 systemd-networkd[1008]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 20:54:39.377987 kubelet[1560]: E0412 20:54:39.377886 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 20:54:40.378534 kubelet[1560]: E0412 20:54:40.378417 1560 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"