Apr 12 19:17:02.549704 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Apr 12 19:17:02.549717 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 19:17:02.549724 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:17:02.549728 kernel: BIOS-provided physical RAM map: Apr 12 19:17:02.549731 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 19:17:02.549735 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 19:17:02.549740 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 19:17:02.549744 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 19:17:02.549748 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 19:17:02.549752 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006df22fff] usable Apr 12 19:17:02.549756 kernel: BIOS-e820: [mem 0x000000006df23000-0x000000006df23fff] ACPI NVS Apr 12 19:17:02.549759 kernel: BIOS-e820: [mem 0x000000006df24000-0x000000006df24fff] reserved Apr 12 19:17:02.549763 kernel: BIOS-e820: [mem 0x000000006df25000-0x0000000077fc4fff] usable Apr 12 19:17:02.549767 kernel: BIOS-e820: [mem 0x0000000077fc5000-0x00000000790a7fff] reserved Apr 12 19:17:02.549773 kernel: BIOS-e820: [mem 0x00000000790a8000-0x0000000079230fff] usable Apr 12 19:17:02.549777 kernel: BIOS-e820: [mem 0x0000000079231000-0x0000000079662fff] ACPI NVS Apr 12 19:17:02.549781 kernel: BIOS-e820: [mem 0x0000000079663000-0x000000007befefff] reserved Apr 12 19:17:02.549785 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Apr 12 19:17:02.549789 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Apr 12 19:17:02.549793 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 19:17:02.549797 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 19:17:02.549801 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 19:17:02.549805 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 19:17:02.549810 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 19:17:02.549814 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Apr 12 19:17:02.549819 kernel: NX (Execute Disable) protection: active Apr 12 19:17:02.549823 kernel: SMBIOS 3.2.1 present. Apr 12 19:17:02.549827 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Apr 12 19:17:02.549831 kernel: tsc: Detected 3400.000 MHz processor Apr 12 19:17:02.549835 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 19:17:02.549839 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 19:17:02.549844 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 19:17:02.549848 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Apr 12 19:17:02.549854 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 19:17:02.549858 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Apr 12 19:17:02.549862 kernel: Using GB pages for direct mapping Apr 12 19:17:02.549866 kernel: ACPI: Early table checksum verification disabled Apr 12 19:17:02.549871 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 19:17:02.549875 kernel: ACPI: XSDT 0x00000000795440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 19:17:02.549880 kernel: ACPI: FACP 0x0000000079580620 000114 (v06 01072009 AMI 00010013) Apr 12 19:17:02.549886 kernel: ACPI: DSDT 0x0000000079544268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 19:17:02.549891 kernel: ACPI: FACS 0x0000000079662F80 000040 Apr 12 19:17:02.549896 kernel: ACPI: APIC 0x0000000079580738 00012C (v04 01072009 AMI 00010013) Apr 12 19:17:02.549901 kernel: ACPI: FPDT 0x0000000079580868 000044 (v01 01072009 AMI 00010013) Apr 12 19:17:02.549905 kernel: ACPI: FIDT 0x00000000795808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 19:17:02.549910 kernel: ACPI: MCFG 0x0000000079580950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 19:17:02.549915 kernel: ACPI: SPMI 0x0000000079580990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 19:17:02.549920 kernel: ACPI: SSDT 0x00000000795809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 19:17:02.549925 kernel: ACPI: SSDT 0x00000000795824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 19:17:02.549929 kernel: ACPI: SSDT 0x00000000795856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 19:17:02.549934 kernel: ACPI: HPET 0x00000000795879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 19:17:02.549939 kernel: ACPI: SSDT 0x0000000079587A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 19:17:02.549943 kernel: ACPI: SSDT 0x00000000795889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 19:17:02.549948 kernel: ACPI: UEFI 0x00000000795892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 19:17:02.549953 kernel: ACPI: LPIT 0x0000000079589318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 19:17:02.549957 kernel: ACPI: SSDT 0x00000000795893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 19:17:02.549962 kernel: ACPI: SSDT 0x000000007958BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 19:17:02.549967 kernel: ACPI: DBGP 0x000000007958D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 19:17:02.549972 kernel: ACPI: DBG2 0x000000007958D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 19:17:02.549976 kernel: ACPI: SSDT 0x000000007958D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 19:17:02.549981 kernel: ACPI: DMAR 0x000000007958EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Apr 12 19:17:02.549986 kernel: ACPI: SSDT 0x000000007958ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 19:17:02.549990 kernel: ACPI: TPM2 0x000000007958EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 19:17:02.549995 kernel: ACPI: SSDT 0x000000007958EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 19:17:02.550001 kernel: ACPI: WSMT 0x000000007958FC28 000028 (v01 \xebm 01072009 AMI 00010013) Apr 12 19:17:02.550005 kernel: ACPI: EINJ 0x000000007958FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 19:17:02.550010 kernel: ACPI: ERST 0x000000007958FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 19:17:02.550015 kernel: ACPI: BERT 0x000000007958FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 19:17:02.550019 kernel: ACPI: HEST 0x000000007958FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 19:17:02.550024 kernel: ACPI: SSDT 0x0000000079590260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 19:17:02.550029 kernel: ACPI: Reserving FACP table memory at [mem 0x79580620-0x79580733] Apr 12 19:17:02.550033 kernel: ACPI: Reserving DSDT table memory at [mem 0x79544268-0x7958061e] Apr 12 19:17:02.550038 kernel: ACPI: Reserving FACS table memory at [mem 0x79662f80-0x79662fbf] Apr 12 19:17:02.550043 kernel: ACPI: Reserving APIC table memory at [mem 0x79580738-0x79580863] Apr 12 19:17:02.550048 kernel: ACPI: Reserving FPDT table memory at [mem 0x79580868-0x795808ab] Apr 12 19:17:02.550052 kernel: ACPI: Reserving FIDT table memory at [mem 0x795808b0-0x7958094b] Apr 12 19:17:02.550057 kernel: ACPI: Reserving MCFG table memory at [mem 0x79580950-0x7958098b] Apr 12 19:17:02.550062 kernel: ACPI: Reserving SPMI table memory at [mem 0x79580990-0x795809d0] Apr 12 19:17:02.550066 kernel: ACPI: Reserving SSDT table memory at [mem 0x795809d8-0x795824f3] Apr 12 19:17:02.550071 kernel: ACPI: Reserving SSDT table memory at [mem 0x795824f8-0x795856bd] Apr 12 19:17:02.550075 kernel: ACPI: Reserving SSDT table memory at [mem 0x795856c0-0x795879ea] Apr 12 19:17:02.550080 kernel: ACPI: Reserving HPET table memory at [mem 0x795879f0-0x79587a27] Apr 12 19:17:02.550085 kernel: ACPI: Reserving SSDT table memory at [mem 0x79587a28-0x795889d5] Apr 12 19:17:02.550090 kernel: ACPI: Reserving SSDT table memory at [mem 0x795889d8-0x795892ce] Apr 12 19:17:02.550094 kernel: ACPI: Reserving UEFI table memory at [mem 0x795892d0-0x79589311] Apr 12 19:17:02.550099 kernel: ACPI: Reserving LPIT table memory at [mem 0x79589318-0x795893ab] Apr 12 19:17:02.550104 kernel: ACPI: Reserving SSDT table memory at [mem 0x795893b0-0x7958bb8d] Apr 12 19:17:02.550108 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958bb90-0x7958d071] Apr 12 19:17:02.550113 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958d078-0x7958d0ab] Apr 12 19:17:02.550117 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958d0b0-0x7958d103] Apr 12 19:17:02.550122 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958d108-0x7958ec6e] Apr 12 19:17:02.550127 kernel: ACPI: Reserving DMAR table memory at [mem 0x7958ec70-0x7958ed17] Apr 12 19:17:02.550132 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ed18-0x7958ee5b] Apr 12 19:17:02.550137 kernel: ACPI: Reserving TPM2 table memory at [mem 0x7958ee60-0x7958ee93] Apr 12 19:17:02.550141 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ee98-0x7958fc26] Apr 12 19:17:02.550146 kernel: ACPI: Reserving WSMT table memory at [mem 0x7958fc28-0x7958fc4f] Apr 12 19:17:02.550150 kernel: ACPI: Reserving EINJ table memory at [mem 0x7958fc50-0x7958fd7f] Apr 12 19:17:02.550155 kernel: ACPI: Reserving ERST table memory at [mem 0x7958fd80-0x7958ffaf] Apr 12 19:17:02.550160 kernel: ACPI: Reserving BERT table memory at [mem 0x7958ffb0-0x7958ffdf] Apr 12 19:17:02.550164 kernel: ACPI: Reserving HEST table memory at [mem 0x7958ffe0-0x7959025b] Apr 12 19:17:02.550170 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590260-0x795903c1] Apr 12 19:17:02.550174 kernel: No NUMA configuration found Apr 12 19:17:02.550179 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Apr 12 19:17:02.550184 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Apr 12 19:17:02.550188 kernel: Zone ranges: Apr 12 19:17:02.550193 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 19:17:02.550197 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 19:17:02.550202 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Apr 12 19:17:02.550207 kernel: Movable zone start for each node Apr 12 19:17:02.550212 kernel: Early memory node ranges Apr 12 19:17:02.550217 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 19:17:02.550221 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 19:17:02.550226 kernel: node 0: [mem 0x0000000040400000-0x000000006df22fff] Apr 12 19:17:02.550231 kernel: node 0: [mem 0x000000006df25000-0x0000000077fc4fff] Apr 12 19:17:02.550235 kernel: node 0: [mem 0x00000000790a8000-0x0000000079230fff] Apr 12 19:17:02.550240 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Apr 12 19:17:02.550244 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Apr 12 19:17:02.550249 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Apr 12 19:17:02.550257 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 19:17:02.550262 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 19:17:02.550267 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 19:17:02.550273 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 19:17:02.550278 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Apr 12 19:17:02.550283 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Apr 12 19:17:02.550288 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Apr 12 19:17:02.550293 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Apr 12 19:17:02.550299 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 19:17:02.550304 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 19:17:02.550309 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 19:17:02.550314 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 19:17:02.550319 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 19:17:02.550323 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 19:17:02.550328 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 19:17:02.550333 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 19:17:02.550338 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 19:17:02.550344 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 19:17:02.550349 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 19:17:02.550354 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 19:17:02.550359 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 19:17:02.550363 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 19:17:02.550368 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 19:17:02.550373 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 19:17:02.550378 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 19:17:02.550383 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 19:17:02.550389 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 19:17:02.550394 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 19:17:02.550399 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 19:17:02.550404 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 19:17:02.550409 kernel: TSC deadline timer available Apr 12 19:17:02.550414 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 19:17:02.550419 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Apr 12 19:17:02.550424 kernel: Booting paravirtualized kernel on bare hardware Apr 12 19:17:02.550429 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 19:17:02.550435 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 19:17:02.550440 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 19:17:02.550444 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 19:17:02.550449 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 19:17:02.550454 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222327 Apr 12 19:17:02.550459 kernel: Policy zone: Normal Apr 12 19:17:02.550465 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:17:02.550470 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 19:17:02.550475 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 19:17:02.550481 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 19:17:02.550486 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 19:17:02.550494 kernel: Memory: 32681612K/33411988K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 730116K reserved, 0K cma-reserved) Apr 12 19:17:02.550499 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 19:17:02.550504 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 19:17:02.550509 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 19:17:02.550514 kernel: rcu: Hierarchical RCU implementation. Apr 12 19:17:02.550519 kernel: rcu: RCU event tracing is enabled. Apr 12 19:17:02.550526 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 19:17:02.550531 kernel: Rude variant of Tasks RCU enabled. Apr 12 19:17:02.550536 kernel: Tracing variant of Tasks RCU enabled. Apr 12 19:17:02.550541 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 19:17:02.550546 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 19:17:02.550551 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 19:17:02.550556 kernel: random: crng init done Apr 12 19:17:02.550560 kernel: Console: colour dummy device 80x25 Apr 12 19:17:02.550565 kernel: printk: console [tty0] enabled Apr 12 19:17:02.550571 kernel: printk: console [ttyS1] enabled Apr 12 19:17:02.550577 kernel: ACPI: Core revision 20210730 Apr 12 19:17:02.550582 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Apr 12 19:17:02.550587 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 19:17:02.550592 kernel: DMAR: Host address width 39 Apr 12 19:17:02.550597 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Apr 12 19:17:02.550602 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Apr 12 19:17:02.550607 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 19:17:02.550612 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 19:17:02.550618 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Apr 12 19:17:02.550623 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Apr 12 19:17:02.550628 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Apr 12 19:17:02.550633 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 19:17:02.550638 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 19:17:02.550643 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 19:17:02.550647 kernel: x2apic enabled Apr 12 19:17:02.550652 kernel: Switched APIC routing to cluster x2apic. Apr 12 19:17:02.550657 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 19:17:02.550663 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 19:17:02.550668 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 19:17:02.550673 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 19:17:02.550678 kernel: process: using mwait in idle threads Apr 12 19:17:02.550683 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 19:17:02.550688 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 19:17:02.550693 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 19:17:02.550698 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 19:17:02.550703 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 19:17:02.550709 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 19:17:02.550714 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 19:17:02.550719 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 19:17:02.550724 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 19:17:02.550729 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 19:17:02.550734 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 19:17:02.550739 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 19:17:02.550744 kernel: TAA: Mitigation: TSX disabled Apr 12 19:17:02.550750 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 19:17:02.550755 kernel: SRBDS: Mitigation: Microcode Apr 12 19:17:02.550760 kernel: GDS: Vulnerable: No microcode Apr 12 19:17:02.550765 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 19:17:02.550770 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 19:17:02.550775 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 19:17:02.550780 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 19:17:02.550785 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 19:17:02.550790 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 19:17:02.550795 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 19:17:02.550801 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 19:17:02.550806 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 19:17:02.550811 kernel: Freeing SMP alternatives memory: 32K Apr 12 19:17:02.550816 kernel: pid_max: default: 32768 minimum: 301 Apr 12 19:17:02.550821 kernel: LSM: Security Framework initializing Apr 12 19:17:02.550826 kernel: SELinux: Initializing. Apr 12 19:17:02.550831 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 19:17:02.550836 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 19:17:02.550841 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 19:17:02.550846 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 19:17:02.550851 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 19:17:02.550856 kernel: ... version: 4 Apr 12 19:17:02.550861 kernel: ... bit width: 48 Apr 12 19:17:02.550866 kernel: ... generic registers: 4 Apr 12 19:17:02.550871 kernel: ... value mask: 0000ffffffffffff Apr 12 19:17:02.550876 kernel: ... max period: 00007fffffffffff Apr 12 19:17:02.550881 kernel: ... fixed-purpose events: 3 Apr 12 19:17:02.550887 kernel: ... event mask: 000000070000000f Apr 12 19:17:02.550892 kernel: signal: max sigframe size: 2032 Apr 12 19:17:02.550897 kernel: rcu: Hierarchical SRCU implementation. Apr 12 19:17:02.550902 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 19:17:02.550907 kernel: smp: Bringing up secondary CPUs ... Apr 12 19:17:02.550912 kernel: x86: Booting SMP configuration: Apr 12 19:17:02.550917 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 19:17:02.550922 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 19:17:02.550928 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 19:17:02.550933 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 19:17:02.550938 kernel: smpboot: Max logical packages: 1 Apr 12 19:17:02.550943 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 19:17:02.550948 kernel: devtmpfs: initialized Apr 12 19:17:02.550953 kernel: x86/mm: Memory block size: 128MB Apr 12 19:17:02.550958 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6df23000-0x6df23fff] (4096 bytes) Apr 12 19:17:02.550963 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79231000-0x79662fff] (4399104 bytes) Apr 12 19:17:02.550968 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 19:17:02.550973 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 19:17:02.550979 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 19:17:02.550984 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 19:17:02.550989 kernel: audit: initializing netlink subsys (disabled) Apr 12 19:17:02.550994 kernel: audit: type=2000 audit(1712949416.122:1): state=initialized audit_enabled=0 res=1 Apr 12 19:17:02.550999 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 19:17:02.551004 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 19:17:02.551009 kernel: cpuidle: using governor menu Apr 12 19:17:02.551014 kernel: ACPI: bus type PCI registered Apr 12 19:17:02.551019 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 19:17:02.551024 kernel: dca service started, version 1.12.1 Apr 12 19:17:02.551029 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 19:17:02.551035 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 19:17:02.551040 kernel: PCI: Using configuration type 1 for base access Apr 12 19:17:02.551045 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 19:17:02.551049 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 19:17:02.551054 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 19:17:02.551059 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 19:17:02.551064 kernel: ACPI: Added _OSI(Module Device) Apr 12 19:17:02.551070 kernel: ACPI: Added _OSI(Processor Device) Apr 12 19:17:02.551075 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 19:17:02.551080 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 19:17:02.551085 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 19:17:02.551090 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 19:17:02.551095 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 19:17:02.551100 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 19:17:02.551105 kernel: ACPI: Dynamic OEM Table Load: Apr 12 19:17:02.551110 kernel: ACPI: SSDT 0xFFFFA04400223600 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 19:17:02.551116 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 19:17:02.551121 kernel: ACPI: Dynamic OEM Table Load: Apr 12 19:17:02.551126 kernel: ACPI: SSDT 0xFFFFA04401CF6000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 19:17:02.551131 kernel: ACPI: Dynamic OEM Table Load: Apr 12 19:17:02.551135 kernel: ACPI: SSDT 0xFFFFA04401C62800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 19:17:02.551140 kernel: ACPI: Dynamic OEM Table Load: Apr 12 19:17:02.551145 kernel: ACPI: SSDT 0xFFFFA04401D50800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 19:17:02.551150 kernel: ACPI: Dynamic OEM Table Load: Apr 12 19:17:02.551155 kernel: ACPI: SSDT 0xFFFFA04400157000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 19:17:02.551160 kernel: ACPI: Dynamic OEM Table Load: Apr 12 19:17:02.551166 kernel: ACPI: SSDT 0xFFFFA04401CF3000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 19:17:02.551171 kernel: ACPI: Interpreter enabled Apr 12 19:17:02.551176 kernel: ACPI: PM: (supports S0 S5) Apr 12 19:17:02.551181 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 19:17:02.551186 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 19:17:02.551191 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 19:17:02.551196 kernel: HEST: Table parsing has been initialized. Apr 12 19:17:02.551201 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 19:17:02.551206 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 19:17:02.551211 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 19:17:02.551216 kernel: ACPI: PM: Power Resource [USBC] Apr 12 19:17:02.551221 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 19:17:02.551226 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 19:17:02.551231 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 19:17:02.551236 kernel: ACPI: PM: Power Resource [WRST] Apr 12 19:17:02.551241 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Apr 12 19:17:02.551246 kernel: ACPI: PM: Power Resource [FN00] Apr 12 19:17:02.551251 kernel: ACPI: PM: Power Resource [FN01] Apr 12 19:17:02.551257 kernel: ACPI: PM: Power Resource [FN02] Apr 12 19:17:02.551261 kernel: ACPI: PM: Power Resource [FN03] Apr 12 19:17:02.551266 kernel: ACPI: PM: Power Resource [FN04] Apr 12 19:17:02.551271 kernel: ACPI: PM: Power Resource [PIN] Apr 12 19:17:02.551276 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 19:17:02.551340 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:17:02.551386 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 19:17:02.551427 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 19:17:02.551436 kernel: PCI host bridge to bus 0000:00 Apr 12 19:17:02.551480 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 19:17:02.551521 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 19:17:02.551559 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 19:17:02.551596 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Apr 12 19:17:02.551633 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 19:17:02.551670 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 19:17:02.551722 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 19:17:02.551773 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 19:17:02.551817 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.551865 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Apr 12 19:17:02.551908 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.551954 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Apr 12 19:17:02.551999 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Apr 12 19:17:02.552041 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Apr 12 19:17:02.552083 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Apr 12 19:17:02.552132 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 19:17:02.552175 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Apr 12 19:17:02.552220 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 19:17:02.552264 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Apr 12 19:17:02.552310 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 19:17:02.552353 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Apr 12 19:17:02.552396 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 19:17:02.552443 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 19:17:02.552486 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Apr 12 19:17:02.552532 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Apr 12 19:17:02.552577 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 19:17:02.552619 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 19:17:02.552664 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 19:17:02.552706 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 19:17:02.552759 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 19:17:02.552804 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Apr 12 19:17:02.552846 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 19:17:02.552891 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 19:17:02.552934 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Apr 12 19:17:02.552976 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 19:17:02.553021 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 19:17:02.553064 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Apr 12 19:17:02.553107 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 19:17:02.553155 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 19:17:02.553197 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Apr 12 19:17:02.553241 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Apr 12 19:17:02.553283 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Apr 12 19:17:02.553324 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Apr 12 19:17:02.553366 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Apr 12 19:17:02.553410 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Apr 12 19:17:02.553453 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 19:17:02.553501 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 19:17:02.553545 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.553593 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 19:17:02.553637 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.553683 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 19:17:02.553726 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.553775 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 19:17:02.553819 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.553868 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Apr 12 19:17:02.553910 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.553956 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 19:17:02.553998 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 19:17:02.554045 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 19:17:02.554092 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 19:17:02.554135 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Apr 12 19:17:02.554178 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 19:17:02.554226 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 19:17:02.554269 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 19:17:02.554311 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 19:17:02.554359 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 19:17:02.554404 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 19:17:02.554450 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Apr 12 19:17:02.554495 kernel: pci 0000:02:00.0: PME# supported from D3cold Apr 12 19:17:02.554538 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 19:17:02.554582 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 19:17:02.554631 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 19:17:02.554675 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 19:17:02.554718 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Apr 12 19:17:02.554765 kernel: pci 0000:02:00.1: PME# supported from D3cold Apr 12 19:17:02.554807 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 19:17:02.554852 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 19:17:02.554894 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 19:17:02.554937 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Apr 12 19:17:02.554979 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 19:17:02.555020 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 19:17:02.555071 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 19:17:02.555115 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 19:17:02.555158 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Apr 12 19:17:02.555202 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 19:17:02.555246 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Apr 12 19:17:02.555289 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.555332 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 19:17:02.555374 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 19:17:02.555418 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Apr 12 19:17:02.555468 kernel: pci 0000:05:00.0: working around ROM BAR overlap defect Apr 12 19:17:02.555516 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Apr 12 19:17:02.555560 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Apr 12 19:17:02.555603 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 19:17:02.555647 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Apr 12 19:17:02.555690 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Apr 12 19:17:02.555735 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 19:17:02.555777 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 19:17:02.555821 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Apr 12 19:17:02.555863 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 19:17:02.555912 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 19:17:02.555956 kernel: pci 0000:07:00.0: enabling Extended Tags Apr 12 19:17:02.556001 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 19:17:02.556046 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 19:17:02.556088 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 19:17:02.556131 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 19:17:02.556173 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Apr 12 19:17:02.556253 kernel: pci_bus 0000:08: extended config space not accessible Apr 12 19:17:02.556323 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 19:17:02.556371 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Apr 12 19:17:02.556417 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Apr 12 19:17:02.556466 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 19:17:02.556514 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 19:17:02.556560 kernel: pci 0000:08:00.0: supports D1 D2 Apr 12 19:17:02.556606 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 19:17:02.556651 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 19:17:02.556695 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 19:17:02.556740 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Apr 12 19:17:02.556749 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 19:17:02.556755 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 19:17:02.556760 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 19:17:02.556766 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 19:17:02.556771 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 19:17:02.556776 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 19:17:02.556781 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 19:17:02.556787 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 19:17:02.556792 kernel: iommu: Default domain type: Translated Apr 12 19:17:02.556798 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 19:17:02.556843 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Apr 12 19:17:02.556889 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 19:17:02.556935 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Apr 12 19:17:02.556943 kernel: vgaarb: loaded Apr 12 19:17:02.556948 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 19:17:02.556954 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 19:17:02.556959 kernel: PTP clock support registered Apr 12 19:17:02.556964 kernel: PCI: Using ACPI for IRQ routing Apr 12 19:17:02.556971 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 19:17:02.556976 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 19:17:02.556981 kernel: e820: reserve RAM buffer [mem 0x6df23000-0x6fffffff] Apr 12 19:17:02.556987 kernel: e820: reserve RAM buffer [mem 0x77fc5000-0x77ffffff] Apr 12 19:17:02.556992 kernel: e820: reserve RAM buffer [mem 0x79231000-0x7bffffff] Apr 12 19:17:02.556997 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Apr 12 19:17:02.557002 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Apr 12 19:17:02.557007 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Apr 12 19:17:02.557012 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Apr 12 19:17:02.557019 kernel: clocksource: Switched to clocksource tsc-early Apr 12 19:17:02.557024 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 19:17:02.557029 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 19:17:02.557034 kernel: pnp: PnP ACPI init Apr 12 19:17:02.557078 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 19:17:02.557123 kernel: pnp 00:02: [dma 0 disabled] Apr 12 19:17:02.557166 kernel: pnp 00:03: [dma 0 disabled] Apr 12 19:17:02.557209 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 19:17:02.557248 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 19:17:02.557290 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 19:17:02.557332 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 19:17:02.557371 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 19:17:02.557410 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 19:17:02.557450 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 19:17:02.557490 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 19:17:02.557528 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 19:17:02.557567 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 19:17:02.557605 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 19:17:02.557647 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 19:17:02.557686 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 19:17:02.557727 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 19:17:02.557764 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 19:17:02.557802 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 19:17:02.557840 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 19:17:02.557878 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 19:17:02.557922 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 19:17:02.557930 kernel: pnp: PnP ACPI: found 10 devices Apr 12 19:17:02.557935 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 19:17:02.557942 kernel: NET: Registered PF_INET protocol family Apr 12 19:17:02.557947 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:17:02.557953 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 19:17:02.557958 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 19:17:02.557964 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:17:02.557969 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 19:17:02.557974 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 19:17:02.557979 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 19:17:02.557986 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 19:17:02.557991 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 19:17:02.557996 kernel: NET: Registered PF_XDP protocol family Apr 12 19:17:02.558039 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Apr 12 19:17:02.558083 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Apr 12 19:17:02.558126 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Apr 12 19:17:02.558170 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 19:17:02.558217 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 19:17:02.558262 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 19:17:02.558307 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 19:17:02.558351 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 19:17:02.558397 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 19:17:02.558440 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Apr 12 19:17:02.558485 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 19:17:02.558531 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 19:17:02.558574 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 19:17:02.558618 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 19:17:02.558661 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Apr 12 19:17:02.558704 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 19:17:02.558747 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 19:17:02.558791 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Apr 12 19:17:02.558836 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 19:17:02.558880 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 19:17:02.558924 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 19:17:02.558969 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Apr 12 19:17:02.559012 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 19:17:02.559057 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 19:17:02.559099 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Apr 12 19:17:02.559137 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 19:17:02.559176 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 19:17:02.559215 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 19:17:02.559253 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 19:17:02.559290 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Apr 12 19:17:02.559326 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 19:17:02.559370 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Apr 12 19:17:02.559410 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 19:17:02.559456 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Apr 12 19:17:02.559500 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Apr 12 19:17:02.559543 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Apr 12 19:17:02.559583 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Apr 12 19:17:02.559626 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 19:17:02.559665 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Apr 12 19:17:02.559707 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Apr 12 19:17:02.559751 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Apr 12 19:17:02.559758 kernel: PCI: CLS 64 bytes, default 64 Apr 12 19:17:02.559764 kernel: DMAR: No ATSR found Apr 12 19:17:02.559769 kernel: DMAR: No SATC found Apr 12 19:17:02.559774 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Apr 12 19:17:02.559780 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Apr 12 19:17:02.559785 kernel: DMAR: IOMMU feature nwfs inconsistent Apr 12 19:17:02.559790 kernel: DMAR: IOMMU feature pasid inconsistent Apr 12 19:17:02.559796 kernel: DMAR: IOMMU feature eafs inconsistent Apr 12 19:17:02.559801 kernel: DMAR: IOMMU feature prs inconsistent Apr 12 19:17:02.559808 kernel: DMAR: IOMMU feature nest inconsistent Apr 12 19:17:02.559813 kernel: DMAR: IOMMU feature mts inconsistent Apr 12 19:17:02.559818 kernel: DMAR: IOMMU feature sc_support inconsistent Apr 12 19:17:02.559823 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Apr 12 19:17:02.559829 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 19:17:02.559834 kernel: DMAR: dmar1: Using Queued invalidation Apr 12 19:17:02.559877 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 19:17:02.559921 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 19:17:02.559966 kernel: pci 0000:00:01.1: Adding to iommu group 1 Apr 12 19:17:02.560010 kernel: pci 0000:00:02.0: Adding to iommu group 2 Apr 12 19:17:02.560053 kernel: pci 0000:00:08.0: Adding to iommu group 3 Apr 12 19:17:02.560096 kernel: pci 0000:00:12.0: Adding to iommu group 4 Apr 12 19:17:02.560138 kernel: pci 0000:00:14.0: Adding to iommu group 5 Apr 12 19:17:02.560180 kernel: pci 0000:00:14.2: Adding to iommu group 5 Apr 12 19:17:02.560223 kernel: pci 0000:00:15.0: Adding to iommu group 6 Apr 12 19:17:02.560265 kernel: pci 0000:00:15.1: Adding to iommu group 6 Apr 12 19:17:02.560308 kernel: pci 0000:00:16.0: Adding to iommu group 7 Apr 12 19:17:02.560351 kernel: pci 0000:00:16.1: Adding to iommu group 7 Apr 12 19:17:02.560394 kernel: pci 0000:00:16.4: Adding to iommu group 7 Apr 12 19:17:02.560435 kernel: pci 0000:00:17.0: Adding to iommu group 8 Apr 12 19:17:02.560477 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Apr 12 19:17:02.560523 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Apr 12 19:17:02.560565 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Apr 12 19:17:02.560609 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Apr 12 19:17:02.560651 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Apr 12 19:17:02.560695 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Apr 12 19:17:02.560738 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Apr 12 19:17:02.560781 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Apr 12 19:17:02.560823 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Apr 12 19:17:02.560868 kernel: pci 0000:02:00.0: Adding to iommu group 1 Apr 12 19:17:02.560912 kernel: pci 0000:02:00.1: Adding to iommu group 1 Apr 12 19:17:02.560956 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 19:17:02.561001 kernel: pci 0000:05:00.0: Adding to iommu group 17 Apr 12 19:17:02.561047 kernel: pci 0000:07:00.0: Adding to iommu group 18 Apr 12 19:17:02.561093 kernel: pci 0000:08:00.0: Adding to iommu group 18 Apr 12 19:17:02.561101 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 19:17:02.561107 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 19:17:02.561112 kernel: software IO TLB: mapped [mem 0x0000000073fc5000-0x0000000077fc5000] (64MB) Apr 12 19:17:02.561118 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Apr 12 19:17:02.561123 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 19:17:02.561128 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 19:17:02.561135 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 19:17:02.561140 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Apr 12 19:17:02.561187 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 19:17:02.561195 kernel: Initialise system trusted keyrings Apr 12 19:17:02.561200 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 19:17:02.561206 kernel: Key type asymmetric registered Apr 12 19:17:02.561211 kernel: Asymmetric key parser 'x509' registered Apr 12 19:17:02.561216 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 19:17:02.561222 kernel: io scheduler mq-deadline registered Apr 12 19:17:02.561228 kernel: io scheduler kyber registered Apr 12 19:17:02.561233 kernel: io scheduler bfq registered Apr 12 19:17:02.561276 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Apr 12 19:17:02.561320 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Apr 12 19:17:02.561363 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Apr 12 19:17:02.561406 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Apr 12 19:17:02.561448 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Apr 12 19:17:02.561494 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Apr 12 19:17:02.561538 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Apr 12 19:17:02.561586 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 19:17:02.561594 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 19:17:02.561600 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 19:17:02.561605 kernel: pstore: Registered erst as persistent store backend Apr 12 19:17:02.561611 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 19:17:02.561616 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 19:17:02.561622 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 19:17:02.561628 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 19:17:02.561670 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 19:17:02.561678 kernel: i8042: PNP: No PS/2 controller found. Apr 12 19:17:02.561716 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 19:17:02.561756 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 19:17:02.561795 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T19:17:01 UTC (1712949421) Apr 12 19:17:02.561834 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 19:17:02.561843 kernel: fail to initialize ptp_kvm Apr 12 19:17:02.561848 kernel: intel_pstate: Intel P-state driver initializing Apr 12 19:17:02.561853 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 19:17:02.561859 kernel: intel_pstate: HWP enabled Apr 12 19:17:02.561864 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 19:17:02.561869 kernel: vesafb: scrolling: redraw Apr 12 19:17:02.561875 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 19:17:02.561880 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x00000000121ff4dc, using 768k, total 768k Apr 12 19:17:02.561885 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 19:17:02.561891 kernel: fb0: VESA VGA frame buffer device Apr 12 19:17:02.561897 kernel: NET: Registered PF_INET6 protocol family Apr 12 19:17:02.561902 kernel: Segment Routing with IPv6 Apr 12 19:17:02.561907 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 19:17:02.561913 kernel: NET: Registered PF_PACKET protocol family Apr 12 19:17:02.561918 kernel: Key type dns_resolver registered Apr 12 19:17:02.561923 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 19:17:02.561928 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 19:17:02.561934 kernel: IPI shorthand broadcast: enabled Apr 12 19:17:02.561940 kernel: sched_clock: Marking stable (1852425104, 1360200045)->(4658830465, -1446205316) Apr 12 19:17:02.561945 kernel: registered taskstats version 1 Apr 12 19:17:02.561950 kernel: Loading compiled-in X.509 certificates Apr 12 19:17:02.561956 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 19:17:02.561961 kernel: Key type .fscrypt registered Apr 12 19:17:02.561966 kernel: Key type fscrypt-provisioning registered Apr 12 19:17:02.561971 kernel: pstore: Using crash dump compression: deflate Apr 12 19:17:02.561977 kernel: ima: Allocated hash algorithm: sha1 Apr 12 19:17:02.561982 kernel: ima: No architecture policies found Apr 12 19:17:02.561988 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 19:17:02.561994 kernel: Write protecting the kernel read-only data: 28672k Apr 12 19:17:02.561999 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 19:17:02.562004 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 19:17:02.562009 kernel: Run /init as init process Apr 12 19:17:02.562015 kernel: with arguments: Apr 12 19:17:02.562020 kernel: /init Apr 12 19:17:02.562025 kernel: with environment: Apr 12 19:17:02.562031 kernel: HOME=/ Apr 12 19:17:02.562036 kernel: TERM=linux Apr 12 19:17:02.562042 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 19:17:02.562048 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:17:02.562055 systemd[1]: Detected architecture x86-64. Apr 12 19:17:02.562060 systemd[1]: Running in initrd. Apr 12 19:17:02.562066 systemd[1]: No hostname configured, using default hostname. Apr 12 19:17:02.562071 systemd[1]: Hostname set to . Apr 12 19:17:02.562077 systemd[1]: Initializing machine ID from random generator. Apr 12 19:17:02.562083 systemd[1]: Queued start job for default target initrd.target. Apr 12 19:17:02.562088 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:17:02.562094 systemd[1]: Reached target cryptsetup.target. Apr 12 19:17:02.562099 systemd[1]: Reached target paths.target. Apr 12 19:17:02.562104 systemd[1]: Reached target slices.target. Apr 12 19:17:02.562109 systemd[1]: Reached target swap.target. Apr 12 19:17:02.562115 systemd[1]: Reached target timers.target. Apr 12 19:17:02.562120 systemd[1]: Listening on iscsid.socket. Apr 12 19:17:02.562127 systemd[1]: Listening on iscsiuio.socket. Apr 12 19:17:02.562132 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 19:17:02.562138 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 19:17:02.562143 systemd[1]: Listening on systemd-journald.socket. Apr 12 19:17:02.562149 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:17:02.562154 kernel: tsc: Refined TSC clocksource calibration: 3407.990 MHz Apr 12 19:17:02.562159 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fcaf6eb0, max_idle_ns: 440795321766 ns Apr 12 19:17:02.562166 kernel: clocksource: Switched to clocksource tsc Apr 12 19:17:02.562171 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:17:02.562177 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:17:02.562182 systemd[1]: Reached target sockets.target. Apr 12 19:17:02.562188 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:17:02.562193 systemd[1]: Finished network-cleanup.service. Apr 12 19:17:02.562199 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 19:17:02.562204 systemd[1]: Starting systemd-journald.service... Apr 12 19:17:02.562209 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:17:02.562218 systemd-journald[268]: Journal started Apr 12 19:17:02.562244 systemd-journald[268]: Runtime Journal (/run/log/journal/ee8d293fe7bc4d0eb0f6777dff59fc0f) is 8.0M, max 639.3M, 631.3M free. Apr 12 19:17:02.564825 systemd-modules-load[269]: Inserted module 'overlay' Apr 12 19:17:02.594806 kernel: audit: type=1334 audit(1712949422.571:2): prog-id=6 op=LOAD Apr 12 19:17:02.594817 systemd[1]: Starting systemd-resolved.service... Apr 12 19:17:02.571000 audit: BPF prog-id=6 op=LOAD Apr 12 19:17:02.639522 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 19:17:02.639558 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 19:17:02.672493 kernel: Bridge firewalling registered Apr 12 19:17:02.672509 systemd[1]: Started systemd-journald.service. Apr 12 19:17:02.687134 systemd-modules-load[269]: Inserted module 'br_netfilter' Apr 12 19:17:02.735406 kernel: audit: type=1130 audit(1712949422.695:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.689753 systemd-resolved[271]: Positive Trust Anchors: Apr 12 19:17:02.791815 kernel: SCSI subsystem initialized Apr 12 19:17:02.791845 kernel: audit: type=1130 audit(1712949422.748:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.689759 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:17:02.913673 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 19:17:02.913688 kernel: audit: type=1130 audit(1712949422.818:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.913697 kernel: device-mapper: uevent: version 1.0.3 Apr 12 19:17:02.913744 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 19:17:02.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.689779 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:17:02.987710 kernel: audit: type=1130 audit(1712949422.921:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.691309 systemd-resolved[271]: Defaulting to hostname 'linux'. Apr 12 19:17:02.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.695714 systemd[1]: Started systemd-resolved.service. Apr 12 19:17:03.096183 kernel: audit: type=1130 audit(1712949422.995:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.096198 kernel: audit: type=1130 audit(1712949423.049:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:02.748658 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:17:02.818646 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 19:17:02.914295 systemd-modules-load[269]: Inserted module 'dm_multipath' Apr 12 19:17:02.922027 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:17:02.995820 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 19:17:03.049797 systemd[1]: Reached target nss-lookup.target. Apr 12 19:17:03.106076 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 19:17:03.127029 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:17:03.127327 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:17:03.130098 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:17:03.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.130750 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:17:03.179579 kernel: audit: type=1130 audit(1712949423.129:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.191837 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 19:17:03.257588 kernel: audit: type=1130 audit(1712949423.191:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.250078 systemd[1]: Starting dracut-cmdline.service... Apr 12 19:17:03.269537 dracut-cmdline[292]: dracut-dracut-053 Apr 12 19:17:03.269537 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 19:17:03.269537 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:17:03.342529 kernel: Loading iSCSI transport class v2.0-870. Apr 12 19:17:03.342542 kernel: iscsi: registered transport (tcp) Apr 12 19:17:03.396073 kernel: iscsi: registered transport (qla4xxx) Apr 12 19:17:03.396091 kernel: QLogic iSCSI HBA Driver Apr 12 19:17:03.412324 systemd[1]: Finished dracut-cmdline.service. Apr 12 19:17:03.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:03.421198 systemd[1]: Starting dracut-pre-udev.service... Apr 12 19:17:03.477554 kernel: raid6: avx2x4 gen() 48218 MB/s Apr 12 19:17:03.513523 kernel: raid6: avx2x4 xor() 21910 MB/s Apr 12 19:17:03.549526 kernel: raid6: avx2x2 gen() 52549 MB/s Apr 12 19:17:03.584562 kernel: raid6: avx2x2 xor() 32106 MB/s Apr 12 19:17:03.619522 kernel: raid6: avx2x1 gen() 45241 MB/s Apr 12 19:17:03.654557 kernel: raid6: avx2x1 xor() 27897 MB/s Apr 12 19:17:03.688493 kernel: raid6: sse2x4 gen() 21348 MB/s Apr 12 19:17:03.722554 kernel: raid6: sse2x4 xor() 11989 MB/s Apr 12 19:17:03.756553 kernel: raid6: sse2x2 gen() 21669 MB/s Apr 12 19:17:03.790561 kernel: raid6: sse2x2 xor() 13388 MB/s Apr 12 19:17:03.824558 kernel: raid6: sse2x1 gen() 18297 MB/s Apr 12 19:17:03.876504 kernel: raid6: sse2x1 xor() 8926 MB/s Apr 12 19:17:03.876520 kernel: raid6: using algorithm avx2x2 gen() 52549 MB/s Apr 12 19:17:03.876528 kernel: raid6: .... xor() 32106 MB/s, rmw enabled Apr 12 19:17:03.894774 kernel: raid6: using avx2x2 recovery algorithm Apr 12 19:17:03.941559 kernel: xor: automatically using best checksumming function avx Apr 12 19:17:04.019497 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 19:17:04.024436 systemd[1]: Finished dracut-pre-udev.service. Apr 12 19:17:04.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:04.024000 audit: BPF prog-id=7 op=LOAD Apr 12 19:17:04.024000 audit: BPF prog-id=8 op=LOAD Apr 12 19:17:04.025441 systemd[1]: Starting systemd-udevd.service... Apr 12 19:17:04.033941 systemd-udevd[471]: Using default interface naming scheme 'v252'. Apr 12 19:17:04.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:04.046025 systemd[1]: Started systemd-udevd.service. Apr 12 19:17:04.085644 dracut-pre-trigger[484]: rd.md=0: removing MD RAID activation Apr 12 19:17:04.062652 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 19:17:04.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:04.089783 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 19:17:04.103349 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:17:04.154028 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:17:04.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:04.184498 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 19:17:04.212499 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 19:17:04.212538 kernel: AES CTR mode by8 optimization enabled Apr 12 19:17:04.212551 kernel: ACPI: bus type USB registered Apr 12 19:17:04.212563 kernel: libata version 3.00 loaded. Apr 12 19:17:04.282500 kernel: usbcore: registered new interface driver usbfs Apr 12 19:17:04.282536 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 19:17:04.282546 kernel: usbcore: registered new interface driver hub Apr 12 19:17:04.282554 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 19:17:04.316545 kernel: usbcore: registered new device driver usb Apr 12 19:17:04.364197 kernel: pps pps0: new PPS source ptp0 Apr 12 19:17:04.364296 kernel: igb 0000:04:00.0: added PHC on eth0 Apr 12 19:17:04.364370 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 19:17:04.399751 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:20 Apr 12 19:17:04.399828 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Apr 12 19:17:04.415493 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 19:17:04.472215 kernel: mlx5_core 0000:02:00.0: firmware version: 14.29.2002 Apr 12 19:17:04.472300 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 19:17:04.472357 kernel: pps pps1: new PPS source ptp1 Apr 12 19:17:04.499847 kernel: igb 0000:05:00.0: added PHC on eth1 Apr 12 19:17:04.499931 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 19:17:04.499988 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 19:17:04.515953 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Apr 12 19:17:04.516028 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:21 Apr 12 19:17:04.533140 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 19:17:04.566895 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Apr 12 19:17:04.596258 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 19:17:04.596339 kernel: scsi host0: ahci Apr 12 19:17:04.617619 kernel: scsi host1: ahci Apr 12 19:17:04.617721 kernel: scsi host2: ahci Apr 12 19:17:04.638257 kernel: scsi host3: ahci Apr 12 19:17:04.648496 kernel: scsi host4: ahci Apr 12 19:17:04.648592 kernel: scsi host5: ahci Apr 12 19:17:04.668703 kernel: scsi host6: ahci Apr 12 19:17:04.669540 kernel: scsi host7: ahci Apr 12 19:17:04.693827 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 139 Apr 12 19:17:04.693842 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 139 Apr 12 19:17:04.708678 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 139 Apr 12 19:17:04.723546 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 19:17:04.723622 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 139 Apr 12 19:17:04.771259 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 139 Apr 12 19:17:04.771276 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 19:17:04.771346 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 139 Apr 12 19:17:04.819544 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 139 Apr 12 19:17:04.819559 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 139 Apr 12 19:17:05.038557 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 19:17:05.085376 kernel: mlx5_core 0000:02:00.1: firmware version: 14.29.2002 Apr 12 19:17:05.085532 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 19:17:05.161512 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 19:17:05.161536 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 19:17:05.176565 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 19:17:05.190511 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 19:17:05.204514 kernel: ata8: SATA link down (SStatus 0 SControl 300) Apr 12 19:17:05.218564 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 19:17:05.232523 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 19:17:05.246493 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 19:17:05.259491 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 19:17:05.275493 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 19:17:05.319837 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 19:17:05.319877 kernel: ata2.00: Features: NCQ-prio Apr 12 19:17:05.319892 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 19:17:05.349902 kernel: ata1.00: Features: NCQ-prio Apr 12 19:17:05.372491 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 19:17:05.372574 kernel: ata2.00: configured for UDMA/133 Apr 12 19:17:05.384520 kernel: port_module: 9 callbacks suppressed Apr 12 19:17:05.384533 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Apr 12 19:17:05.384600 kernel: ata1.00: configured for UDMA/133 Apr 12 19:17:05.412491 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 19:17:05.412561 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 19:17:05.458538 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 19:17:05.489506 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Apr 12 19:17:05.519290 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 19:17:05.519401 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 19:17:05.538547 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 19:17:05.538641 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Apr 12 19:17:05.551560 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 19:17:05.564545 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 19:17:05.595464 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 19:17:05.620617 kernel: hub 1-0:1.0: USB hub found Apr 12 19:17:05.620741 kernel: hub 1-0:1.0: 16 ports detected Apr 12 19:17:05.620840 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 19:17:05.639564 kernel: hub 2-0:1.0: USB hub found Apr 12 19:17:05.665241 kernel: hub 2-0:1.0: 10 ports detected Apr 12 19:17:05.665351 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 19:17:05.679183 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 19:17:05.693107 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 19:17:05.693191 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 19:17:05.726210 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 19:17:05.726288 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 19:17:05.740424 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 19:17:05.767679 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 19:17:05.767756 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 19:17:05.780971 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 19:17:05.781048 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 19:17:05.781109 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 19:17:05.829640 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 19:17:05.842774 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 19:17:05.855733 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 19:17:05.855748 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 19:17:05.868552 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 19:17:05.898984 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 19:17:05.899051 kernel: GPT:9289727 != 937703087 Apr 12 19:17:05.899075 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 19:17:05.899089 kernel: GPT:9289727 != 937703087 Apr 12 19:17:05.899107 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 19:17:05.899134 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:17:05.979121 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 19:17:05.979138 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 19:17:06.010537 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Apr 12 19:17:06.023692 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 19:17:06.087659 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (522) Apr 12 19:17:06.087676 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Apr 12 19:17:06.087750 kernel: hub 1-14:1.0: USB hub found Apr 12 19:17:06.087815 kernel: hub 1-14:1.0: 4 ports detected Apr 12 19:17:06.087591 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 19:17:06.108456 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 19:17:06.144152 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 19:17:06.157702 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:17:06.174765 systemd[1]: Starting disk-uuid.service... Apr 12 19:17:06.206568 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 19:17:06.206585 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:17:06.206639 disk-uuid[691]: Primary Header is updated. Apr 12 19:17:06.206639 disk-uuid[691]: Secondary Entries is updated. Apr 12 19:17:06.206639 disk-uuid[691]: Secondary Header is updated. Apr 12 19:17:06.253576 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 19:17:06.253587 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:17:06.253594 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 19:17:06.272528 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:17:06.336558 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 19:17:06.486506 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 19:17:06.517820 kernel: usbcore: registered new interface driver usbhid Apr 12 19:17:06.517842 kernel: usbhid: USB HID core driver Apr 12 19:17:06.548538 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 19:17:06.661058 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 19:17:06.661186 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 19:17:06.661200 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 19:17:07.258383 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 19:17:07.276260 disk-uuid[692]: The operation has completed successfully. Apr 12 19:17:07.284688 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:17:07.313371 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 19:17:07.407282 kernel: audit: type=1130 audit(1712949427.321:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.407300 kernel: audit: type=1131 audit(1712949427.321:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.313429 systemd[1]: Finished disk-uuid.service. Apr 12 19:17:07.436523 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 19:17:07.325027 systemd[1]: Starting verity-setup.service... Apr 12 19:17:07.464474 systemd[1]: Found device dev-mapper-usr.device. Apr 12 19:17:07.473570 systemd[1]: Mounting sysusr-usr.mount... Apr 12 19:17:07.479805 systemd[1]: Finished verity-setup.service. Apr 12 19:17:07.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.544493 kernel: audit: type=1130 audit(1712949427.498:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.572204 systemd[1]: Mounted sysusr-usr.mount. Apr 12 19:17:07.587841 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 19:17:07.580779 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 19:17:07.669873 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:17:07.669887 kernel: BTRFS info (device sda6): using free space tree Apr 12 19:17:07.669894 kernel: BTRFS info (device sda6): has skinny extents Apr 12 19:17:07.669901 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 19:17:07.581169 systemd[1]: Starting ignition-setup.service... Apr 12 19:17:07.600998 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 19:17:07.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.677955 systemd[1]: Finished ignition-setup.service. Apr 12 19:17:07.798358 kernel: audit: type=1130 audit(1712949427.693:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.798376 kernel: audit: type=1130 audit(1712949427.749:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.693832 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 19:17:07.830144 kernel: audit: type=1334 audit(1712949427.807:24): prog-id=9 op=LOAD Apr 12 19:17:07.807000 audit: BPF prog-id=9 op=LOAD Apr 12 19:17:07.750158 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 19:17:07.808370 systemd[1]: Starting systemd-networkd.service... Apr 12 19:17:07.843999 systemd-networkd[883]: lo: Link UP Apr 12 19:17:07.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.873869 ignition[872]: Ignition 2.14.0 Apr 12 19:17:07.924598 kernel: audit: type=1130 audit(1712949427.860:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.844001 systemd-networkd[883]: lo: Gained carrier Apr 12 19:17:07.873873 ignition[872]: Stage: fetch-offline Apr 12 19:17:07.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.844292 systemd-networkd[883]: Enumeration completed Apr 12 19:17:08.073209 kernel: audit: type=1130 audit(1712949427.938:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:08.073297 kernel: audit: type=1130 audit(1712949427.999:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:08.073305 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 19:17:07.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.873897 ignition[872]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:17:08.107869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Apr 12 19:17:07.844362 systemd[1]: Started systemd-networkd.service. Apr 12 19:17:07.873910 ignition[872]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:17:07.844967 systemd-networkd[883]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:17:08.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.876813 ignition[872]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:17:07.860596 systemd[1]: Reached target network.target. Apr 12 19:17:08.158720 iscsid[909]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:17:08.158720 iscsid[909]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 19:17:08.158720 iscsid[909]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 19:17:08.158720 iscsid[909]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 19:17:08.158720 iscsid[909]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 19:17:08.158720 iscsid[909]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:17:08.158720 iscsid[909]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 19:17:08.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.876878 ignition[872]: parsed url from cmdline: "" Apr 12 19:17:07.891834 unknown[872]: fetched base config from "system" Apr 12 19:17:08.327608 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Apr 12 19:17:08.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:07.876880 ignition[872]: no config URL provided Apr 12 19:17:07.891838 unknown[872]: fetched user config from "system" Apr 12 19:17:07.876883 ignition[872]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 19:17:07.919176 systemd[1]: Starting iscsiuio.service... Apr 12 19:17:07.881022 ignition[872]: parsing config with SHA512: 672522309a23c695c817b26d268c88eacc092d5f71fe1a24f7142244b838b6d36495d39b893894e258a4c54a036c750f40f037021b991c4c8e7696d31c707381 Apr 12 19:17:07.931760 systemd[1]: Started iscsiuio.service. Apr 12 19:17:07.892090 ignition[872]: fetch-offline: fetch-offline passed Apr 12 19:17:07.938832 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 19:17:07.892093 ignition[872]: POST message to Packet Timeline Apr 12 19:17:07.999734 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 19:17:07.892098 ignition[872]: POST Status error: resource requires networking Apr 12 19:17:08.000188 systemd[1]: Starting ignition-kargs.service... Apr 12 19:17:07.892125 ignition[872]: Ignition finished successfully Apr 12 19:17:08.074722 systemd-networkd[883]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:17:08.077606 ignition[898]: Ignition 2.14.0 Apr 12 19:17:08.087055 systemd[1]: Starting iscsid.service... Apr 12 19:17:08.077610 ignition[898]: Stage: kargs Apr 12 19:17:08.115115 systemd[1]: Started iscsid.service. Apr 12 19:17:08.077666 ignition[898]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:17:08.130690 systemd[1]: Starting dracut-initqueue.service... Apr 12 19:17:08.077675 ignition[898]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:17:08.148724 systemd[1]: Finished dracut-initqueue.service. Apr 12 19:17:08.078961 ignition[898]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:17:08.170605 systemd[1]: Reached target remote-fs-pre.target. Apr 12 19:17:08.080256 ignition[898]: kargs: kargs passed Apr 12 19:17:08.181746 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:17:08.080262 ignition[898]: POST message to Packet Timeline Apr 12 19:17:08.223702 systemd[1]: Reached target remote-fs.target. Apr 12 19:17:08.080271 ignition[898]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:17:08.252430 systemd[1]: Starting dracut-pre-mount.service... Apr 12 19:17:08.098096 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50285->[::1]:53: read: connection refused Apr 12 19:17:08.276761 systemd[1]: Finished dracut-pre-mount.service. Apr 12 19:17:08.298501 ignition[898]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 19:17:08.321790 systemd-networkd[883]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:17:08.299105 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33935->[::1]:53: read: connection refused Apr 12 19:17:08.350907 systemd-networkd[883]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:17:08.380845 systemd-networkd[883]: enp2s0f1np1: Link UP Apr 12 19:17:08.381351 systemd-networkd[883]: enp2s0f1np1: Gained carrier Apr 12 19:17:08.396020 systemd-networkd[883]: enp2s0f0np0: Link UP Apr 12 19:17:08.396564 systemd-networkd[883]: eno2: Link UP Apr 12 19:17:08.397067 systemd-networkd[883]: eno1: Link UP Apr 12 19:17:08.699237 ignition[898]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 19:17:08.700342 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53533->[::1]:53: read: connection refused Apr 12 19:17:09.139893 systemd-networkd[883]: enp2s0f0np0: Gained carrier Apr 12 19:17:09.149735 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Apr 12 19:17:09.186700 systemd-networkd[883]: enp2s0f0np0: DHCPv4 address 139.178.89.219/31, gateway 139.178.89.218 acquired from 145.40.83.140 Apr 12 19:17:09.500847 ignition[898]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 19:17:09.502273 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49045->[::1]:53: read: connection refused Apr 12 19:17:09.757065 systemd-networkd[883]: enp2s0f1np1: Gained IPv6LL Apr 12 19:17:10.332964 systemd-networkd[883]: enp2s0f0np0: Gained IPv6LL Apr 12 19:17:11.103787 ignition[898]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 19:17:11.104994 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57954->[::1]:53: read: connection refused Apr 12 19:17:14.308475 ignition[898]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 19:17:14.348688 ignition[898]: GET result: OK Apr 12 19:17:14.551464 ignition[898]: Ignition finished successfully Apr 12 19:17:14.556061 systemd[1]: Finished ignition-kargs.service. Apr 12 19:17:14.644492 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 19:17:14.644533 kernel: audit: type=1130 audit(1712949434.566:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:14.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:14.576256 ignition[924]: Ignition 2.14.0 Apr 12 19:17:14.569019 systemd[1]: Starting ignition-disks.service... Apr 12 19:17:14.576259 ignition[924]: Stage: disks Apr 12 19:17:14.576366 ignition[924]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:17:14.576376 ignition[924]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:17:14.578740 ignition[924]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:17:14.579276 ignition[924]: disks: disks passed Apr 12 19:17:14.579279 ignition[924]: POST message to Packet Timeline Apr 12 19:17:14.579289 ignition[924]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:17:14.602441 ignition[924]: GET result: OK Apr 12 19:17:14.801040 ignition[924]: Ignition finished successfully Apr 12 19:17:14.803977 systemd[1]: Finished ignition-disks.service. Apr 12 19:17:14.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:14.818101 systemd[1]: Reached target initrd-root-device.target. Apr 12 19:17:14.906741 kernel: audit: type=1130 audit(1712949434.817:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:14.883681 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:17:14.892696 systemd[1]: Reached target local-fs.target. Apr 12 19:17:14.892730 systemd[1]: Reached target sysinit.target. Apr 12 19:17:14.915673 systemd[1]: Reached target basic.target. Apr 12 19:17:14.929356 systemd[1]: Starting systemd-fsck-root.service... Apr 12 19:17:14.947153 systemd-fsck[938]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 19:17:14.968974 systemd[1]: Finished systemd-fsck-root.service. Apr 12 19:17:15.062903 kernel: audit: type=1130 audit(1712949434.977:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.062918 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 19:17:14.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:14.979546 systemd[1]: Mounting sysroot.mount... Apr 12 19:17:15.070156 systemd[1]: Mounted sysroot.mount. Apr 12 19:17:15.083737 systemd[1]: Reached target initrd-root-fs.target. Apr 12 19:17:15.091436 systemd[1]: Mounting sysroot-usr.mount... Apr 12 19:17:15.112502 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 19:17:15.128066 systemd[1]: Starting flatcar-static-network.service... Apr 12 19:17:15.143643 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 19:17:15.143690 systemd[1]: Reached target ignition-diskful.target. Apr 12 19:17:15.162547 systemd[1]: Mounted sysroot-usr.mount. Apr 12 19:17:15.187382 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:17:15.261610 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (949) Apr 12 19:17:15.261627 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:17:15.199177 systemd[1]: Starting initrd-setup-root.service... Apr 12 19:17:15.328626 kernel: BTRFS info (device sda6): using free space tree Apr 12 19:17:15.328639 kernel: BTRFS info (device sda6): has skinny extents Apr 12 19:17:15.328647 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 19:17:15.264825 systemd[1]: Finished initrd-setup-root.service. Apr 12 19:17:15.402485 kernel: audit: type=1130 audit(1712949435.347:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.402535 coreos-metadata[946]: Apr 12 19:17:15.290 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:17:15.402535 coreos-metadata[946]: Apr 12 19:17:15.335 INFO Fetch successful Apr 12 19:17:15.589177 kernel: audit: type=1130 audit(1712949435.411:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.589189 kernel: audit: type=1130 audit(1712949435.476:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.589197 kernel: audit: type=1131 audit(1712949435.476:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.589253 coreos-metadata[945]: Apr 12 19:17:15.290 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:17:15.589253 coreos-metadata[945]: Apr 12 19:17:15.335 INFO Fetch successful Apr 12 19:17:15.589253 coreos-metadata[945]: Apr 12 19:17:15.353 INFO wrote hostname ci-3510.3.3-a-a88028f4fa to /sysroot/etc/hostname Apr 12 19:17:15.639571 initrd-setup-root[956]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 19:17:15.369105 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 19:17:15.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.694709 initrd-setup-root[964]: cut: /sysroot/etc/group: No such file or directory Apr 12 19:17:15.732703 kernel: audit: type=1130 audit(1712949435.666:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.411805 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 19:17:15.742743 initrd-setup-root[972]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 19:17:15.411845 systemd[1]: Finished flatcar-static-network.service. Apr 12 19:17:15.761718 initrd-setup-root[980]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 19:17:15.476757 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:17:15.779698 ignition[1021]: INFO : Ignition 2.14.0 Apr 12 19:17:15.779698 ignition[1021]: INFO : Stage: mount Apr 12 19:17:15.779698 ignition[1021]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:17:15.779698 ignition[1021]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:17:15.779698 ignition[1021]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:17:15.779698 ignition[1021]: INFO : mount: mount passed Apr 12 19:17:15.779698 ignition[1021]: INFO : POST message to Packet Timeline Apr 12 19:17:15.779698 ignition[1021]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:17:15.779698 ignition[1021]: INFO : GET result: OK Apr 12 19:17:15.599148 systemd[1]: Starting ignition-mount.service... Apr 12 19:17:15.627125 systemd[1]: Starting sysroot-boot.service... Apr 12 19:17:15.882787 ignition[1021]: INFO : Ignition finished successfully Apr 12 19:17:15.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.648319 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 19:17:15.975221 kernel: audit: type=1130 audit(1712949435.890:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:15.975236 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1034) Apr 12 19:17:15.648358 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 19:17:16.082562 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:17:16.082575 kernel: BTRFS info (device sda6): using free space tree Apr 12 19:17:16.082583 kernel: BTRFS info (device sda6): has skinny extents Apr 12 19:17:16.082590 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 19:17:15.649010 systemd[1]: Finished sysroot-boot.service. Apr 12 19:17:15.877142 systemd[1]: Finished ignition-mount.service. Apr 12 19:17:15.892601 systemd[1]: Starting ignition-files.service... Apr 12 19:17:16.121655 ignition[1053]: INFO : Ignition 2.14.0 Apr 12 19:17:16.121655 ignition[1053]: INFO : Stage: files Apr 12 19:17:16.121655 ignition[1053]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:17:16.121655 ignition[1053]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:17:16.121655 ignition[1053]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:17:16.121655 ignition[1053]: DEBUG : files: compiled without relabeling support, skipping Apr 12 19:17:16.121655 ignition[1053]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 19:17:16.121655 ignition[1053]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 19:17:16.121655 ignition[1053]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 19:17:16.121655 ignition[1053]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 19:17:16.121655 ignition[1053]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 19:17:16.121655 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 19:17:16.121655 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 19:17:15.959279 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:17:16.095222 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:17:16.118841 unknown[1053]: wrote ssh authorized keys file for user: core Apr 12 19:17:16.708906 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 19:17:16.803947 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 19:17:16.803947 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 19:17:16.847708 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 19:17:16.847708 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 19:17:17.210963 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 19:17:17.263457 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 19:17:17.263457 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 19:17:17.306714 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:17:17.306714 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 19:17:17.343215 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 19:17:17.529650 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 4261cb0319688a0557b3052cce8df9d754abc38d5fc8e0eeeb63a85a2194895fdca5bad464f8516459ed7b1764d7bbb2304f5f434d42bb35f38764b4b00ce663 Apr 12 19:17:17.529650 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:17:17.529650 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:17:17.585591 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 19:17:17.585591 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 19:17:18.353808 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: d3fef1d4b99415179ecb94d4de953bddb74c0fb0f798265829b899bb031e2ab8c2b60037b79a66405a9b102d3db0d90e9257595f4b11660356de0e2e63744cd7 Apr 12 19:17:18.353808 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803326973" Apr 12 19:17:18.409600 ignition[1053]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803326973": device or resource busy Apr 12 19:17:18.409600 ignition[1053]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1803326973", trying btrfs: device or resource busy Apr 12 19:17:18.409600 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803326973" Apr 12 19:17:18.615760 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1074) Apr 12 19:17:18.615289 systemd[1]: Finished ignition-files.service. Apr 12 19:17:18.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.682019 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803326973" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1803326973" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1803326973" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(f): [started] processing unit "packet-phone-home.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(f): [finished] processing unit "packet-phone-home.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(10): [started] processing unit "prepare-cni-plugins.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(10): op(11): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(10): op(11): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(10): [finished] processing unit "prepare-cni-plugins.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(12): [started] processing unit "prepare-critools.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(12): op(13): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(12): op(13): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(12): [finished] processing unit "prepare-critools.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(14): [started] setting preset to enabled for "prepare-critools.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 19:17:18.682019 ignition[1053]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:17:19.081801 kernel: audit: type=1130 audit(1712949438.623:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.630414 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 19:17:19.098880 ignition[1053]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:17:19.098880 ignition[1053]: INFO : files: op(16): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 19:17:19.098880 ignition[1053]: INFO : files: op(16): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 19:17:19.098880 ignition[1053]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:17:19.098880 ignition[1053]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:17:19.098880 ignition[1053]: INFO : files: createResultFile: createFiles: op(18): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:17:19.098880 ignition[1053]: INFO : files: createResultFile: createFiles: op(18): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:17:19.098880 ignition[1053]: INFO : files: files passed Apr 12 19:17:19.098880 ignition[1053]: INFO : POST message to Packet Timeline Apr 12 19:17:19.098880 ignition[1053]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:17:19.098880 ignition[1053]: INFO : GET result: OK Apr 12 19:17:19.098880 ignition[1053]: INFO : Ignition finished successfully Apr 12 19:17:19.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.690748 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 19:17:19.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.691140 systemd[1]: Starting ignition-quench.service... Apr 12 19:17:19.378786 initrd-setup-root-after-ignition[1088]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 19:17:18.708033 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 19:17:18.737955 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 19:17:18.738021 systemd[1]: Finished ignition-quench.service. Apr 12 19:17:19.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.759859 systemd[1]: Reached target ignition-complete.target. Apr 12 19:17:19.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.786719 systemd[1]: Starting initrd-parse-etc.service... Apr 12 19:17:19.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.824410 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 19:17:18.824485 systemd[1]: Finished initrd-parse-etc.service. Apr 12 19:17:19.512602 iscsid[909]: iscsid shutting down. Apr 12 19:17:19.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.527764 ignition[1103]: INFO : Ignition 2.14.0 Apr 12 19:17:19.527764 ignition[1103]: INFO : Stage: umount Apr 12 19:17:19.527764 ignition[1103]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:17:19.527764 ignition[1103]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:17:19.527764 ignition[1103]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:17:19.527764 ignition[1103]: INFO : umount: umount passed Apr 12 19:17:19.527764 ignition[1103]: INFO : POST message to Packet Timeline Apr 12 19:17:19.527764 ignition[1103]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:17:19.527764 ignition[1103]: INFO : GET result: OK Apr 12 19:17:19.720749 kernel: kauditd_printk_skb: 16 callbacks suppressed Apr 12 19:17:19.720767 kernel: audit: type=1131 audit(1712949439.602:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.827864 systemd[1]: Reached target initrd-fs.target. Apr 12 19:17:19.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.790734 ignition[1103]: INFO : Ignition finished successfully Apr 12 19:17:19.911066 kernel: audit: type=1131 audit(1712949439.733:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.911082 kernel: audit: type=1130 audit(1712949439.798:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.911090 kernel: audit: type=1131 audit(1712949439.798:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.853781 systemd[1]: Reached target initrd.target. Apr 12 19:17:19.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.872953 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 19:17:20.041539 kernel: audit: type=1131 audit(1712949439.919:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:20.041553 kernel: audit: type=1131 audit(1712949439.983:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.875089 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 19:17:18.908571 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 19:17:18.926094 systemd[1]: Starting initrd-cleanup.service... Apr 12 19:17:20.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.961634 systemd[1]: Stopped target nss-lookup.target. Apr 12 19:17:20.202063 kernel: audit: type=1131 audit(1712949440.076:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:20.202079 kernel: audit: type=1131 audit(1712949440.143:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:20.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:18.982208 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 19:17:20.269062 kernel: audit: type=1131 audit(1712949440.210:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:20.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.008242 systemd[1]: Stopped target timers.target. Apr 12 19:17:20.338146 kernel: audit: type=1131 audit(1712949440.278:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:20.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.026168 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 19:17:19.026543 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 19:17:19.048504 systemd[1]: Stopped target initrd.target. Apr 12 19:17:19.068179 systemd[1]: Stopped target basic.target. Apr 12 19:17:19.089204 systemd[1]: Stopped target ignition-complete.target. Apr 12 19:17:20.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.108180 systemd[1]: Stopped target ignition-diskful.target. Apr 12 19:17:20.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:20.407000 audit: BPF prog-id=6 op=UNLOAD Apr 12 19:17:19.132138 systemd[1]: Stopped target initrd-root-device.target. Apr 12 19:17:19.153201 systemd[1]: Stopped target remote-fs.target. Apr 12 19:17:19.174163 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 19:17:19.197195 systemd[1]: Stopped target sysinit.target. Apr 12 19:17:20.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.219200 systemd[1]: Stopped target local-fs.target. Apr 12 19:17:20.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.243161 systemd[1]: Stopped target local-fs-pre.target. Apr 12 19:17:20.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.267160 systemd[1]: Stopped target swap.target. Apr 12 19:17:19.281082 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 19:17:20.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.281445 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 19:17:19.297410 systemd[1]: Stopped target cryptsetup.target. Apr 12 19:17:19.315060 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 19:17:20.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.315422 systemd[1]: Stopped dracut-initqueue.service. Apr 12 19:17:20.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.331339 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 19:17:20.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.331711 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 19:17:19.347392 systemd[1]: Stopped target paths.target. Apr 12 19:17:20.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.372040 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 19:17:20.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:20.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.376711 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 19:17:19.387190 systemd[1]: Stopped target slices.target. Apr 12 19:17:19.408132 systemd[1]: Stopped target sockets.target. Apr 12 19:17:19.425204 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 19:17:19.425611 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 19:17:19.443289 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 19:17:19.443671 systemd[1]: Stopped ignition-files.service. Apr 12 19:17:19.458287 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 19:17:19.458667 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 19:17:19.477537 systemd[1]: Stopping ignition-mount.service... Apr 12 19:17:19.489777 systemd[1]: Stopping iscsid.service... Apr 12 19:17:19.505662 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 19:17:19.505760 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 19:17:19.521574 systemd[1]: Stopping sysroot-boot.service... Apr 12 19:17:19.534661 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 19:17:19.534939 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 19:17:20.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:19.550231 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 19:17:19.550659 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 19:17:19.574292 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 19:17:19.576574 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 19:17:19.576808 systemd[1]: Stopped iscsid.service. Apr 12 19:17:19.604656 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 19:17:19.604923 systemd[1]: Closed iscsid.socket. Apr 12 19:17:19.689651 systemd[1]: Stopping iscsiuio.service... Apr 12 19:17:19.710912 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 19:17:19.710954 systemd[1]: Stopped iscsiuio.service. Apr 12 19:17:19.733988 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 19:17:19.734044 systemd[1]: Finished initrd-cleanup.service. Apr 12 19:17:19.798802 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 19:17:19.798841 systemd[1]: Stopped ignition-mount.service. Apr 12 19:17:19.919798 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 19:17:19.919852 systemd[1]: Stopped sysroot-boot.service. Apr 12 19:17:19.984125 systemd[1]: Stopped target network.target. Apr 12 19:17:20.049721 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 19:17:20.049740 systemd[1]: Closed iscsiuio.socket. Apr 12 19:17:20.062700 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 19:17:20.062723 systemd[1]: Stopped ignition-disks.service. Apr 12 19:17:20.076697 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 19:17:20.076719 systemd[1]: Stopped ignition-kargs.service. Apr 12 19:17:20.143782 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 19:17:20.143822 systemd[1]: Stopped ignition-setup.service. Apr 12 19:17:20.210766 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 19:17:20.210804 systemd[1]: Stopped initrd-setup-root.service. Apr 12 19:17:20.278874 systemd[1]: Stopping systemd-networkd.service... Apr 12 19:17:20.339653 systemd-networkd[883]: enp2s0f1np1: DHCPv6 lease lost Apr 12 19:17:20.346756 systemd[1]: Stopping systemd-resolved.service... Apr 12 19:17:20.351698 systemd-networkd[883]: enp2s0f0np0: DHCPv6 lease lost Apr 12 19:17:20.369849 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 19:17:20.877000 audit: BPF prog-id=9 op=UNLOAD Apr 12 19:17:20.369895 systemd[1]: Stopped systemd-resolved.service. Apr 12 19:17:20.389972 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 19:17:20.390036 systemd[1]: Stopped systemd-networkd.service. Apr 12 19:17:20.406774 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 19:17:20.406795 systemd[1]: Closed systemd-networkd.socket. Apr 12 19:17:20.423054 systemd[1]: Stopping network-cleanup.service... Apr 12 19:17:20.443624 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 19:17:20.443671 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 19:17:20.878495 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Apr 12 19:17:20.459790 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 19:17:20.459869 systemd[1]: Stopped systemd-sysctl.service. Apr 12 19:17:20.476313 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 19:17:20.476443 systemd[1]: Stopped systemd-modules-load.service. Apr 12 19:17:20.492260 systemd[1]: Stopping systemd-udevd.service... Apr 12 19:17:20.509496 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 19:17:20.510170 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 19:17:20.510229 systemd[1]: Stopped systemd-udevd.service. Apr 12 19:17:20.513826 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 19:17:20.513854 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 19:17:20.536705 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 19:17:20.536735 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 19:17:20.552684 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 19:17:20.552737 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 19:17:20.568734 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 19:17:20.568814 systemd[1]: Stopped dracut-cmdline.service. Apr 12 19:17:20.584925 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 19:17:20.585061 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 19:17:20.601469 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 19:17:20.618669 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 19:17:20.618803 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 19:17:20.636730 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 19:17:20.636978 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 19:17:20.780730 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 19:17:20.780974 systemd[1]: Stopped network-cleanup.service. Apr 12 19:17:20.795120 systemd[1]: Reached target initrd-switch-root.target. Apr 12 19:17:20.812577 systemd[1]: Starting initrd-switch-root.service... Apr 12 19:17:20.840477 systemd[1]: Switching root. Apr 12 19:17:20.879031 systemd-journald[268]: Journal stopped Apr 12 19:17:24.581338 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 19:17:24.581354 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 19:17:24.581361 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 19:17:24.581367 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 19:17:24.581372 kernel: SELinux: policy capability open_perms=1 Apr 12 19:17:24.581377 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 19:17:24.581383 kernel: SELinux: policy capability always_check_network=0 Apr 12 19:17:24.581389 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 19:17:24.581395 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 19:17:24.581400 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 19:17:24.581405 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 19:17:24.581411 systemd[1]: Successfully loaded SELinux policy in 320.218ms. Apr 12 19:17:24.581418 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.830ms. Apr 12 19:17:24.581425 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:17:24.581433 systemd[1]: Detected architecture x86-64. Apr 12 19:17:24.581438 systemd[1]: Detected first boot. Apr 12 19:17:24.581444 systemd[1]: Hostname set to . Apr 12 19:17:24.581450 systemd[1]: Initializing machine ID from random generator. Apr 12 19:17:24.581457 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 19:17:24.581463 systemd[1]: Populated /etc with preset unit settings. Apr 12 19:17:24.581469 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:17:24.581476 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:17:24.581483 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:17:24.581491 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 19:17:24.581498 systemd[1]: Stopped initrd-switch-root.service. Apr 12 19:17:24.581504 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 19:17:24.581512 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 19:17:24.581518 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 19:17:24.581524 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 19:17:24.581530 systemd[1]: Created slice system-getty.slice. Apr 12 19:17:24.581536 systemd[1]: Created slice system-modprobe.slice. Apr 12 19:17:24.581542 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 19:17:24.581548 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 19:17:24.581554 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 19:17:24.581561 systemd[1]: Created slice user.slice. Apr 12 19:17:24.581567 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:17:24.581573 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 19:17:24.581579 systemd[1]: Set up automount boot.automount. Apr 12 19:17:24.581585 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 19:17:24.581591 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 19:17:24.581599 systemd[1]: Stopped target initrd-fs.target. Apr 12 19:17:24.581606 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 19:17:24.581612 systemd[1]: Reached target integritysetup.target. Apr 12 19:17:24.581619 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:17:24.581626 systemd[1]: Reached target remote-fs.target. Apr 12 19:17:24.581632 systemd[1]: Reached target slices.target. Apr 12 19:17:24.581638 systemd[1]: Reached target swap.target. Apr 12 19:17:24.581644 systemd[1]: Reached target torcx.target. Apr 12 19:17:24.581650 systemd[1]: Reached target veritysetup.target. Apr 12 19:17:24.581657 systemd[1]: Listening on systemd-coredump.socket. Apr 12 19:17:24.581663 systemd[1]: Listening on systemd-initctl.socket. Apr 12 19:17:24.581670 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:17:24.581677 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:17:24.581683 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:17:24.581690 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 19:17:24.581697 systemd[1]: Mounting dev-hugepages.mount... Apr 12 19:17:24.581703 systemd[1]: Mounting dev-mqueue.mount... Apr 12 19:17:24.581710 systemd[1]: Mounting media.mount... Apr 12 19:17:24.581716 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:17:24.581723 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 19:17:24.581729 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 19:17:24.581735 systemd[1]: Mounting tmp.mount... Apr 12 19:17:24.581742 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 19:17:24.581748 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 19:17:24.581756 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:17:24.581762 systemd[1]: Starting modprobe@configfs.service... Apr 12 19:17:24.581769 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 19:17:24.581775 systemd[1]: Starting modprobe@drm.service... Apr 12 19:17:24.581781 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 19:17:24.581788 systemd[1]: Starting modprobe@fuse.service... Apr 12 19:17:24.581794 kernel: fuse: init (API version 7.34) Apr 12 19:17:24.581800 systemd[1]: Starting modprobe@loop.service... Apr 12 19:17:24.581806 kernel: loop: module loaded Apr 12 19:17:24.581814 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 19:17:24.581820 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 19:17:24.581826 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 19:17:24.581833 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 19:17:24.581839 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 19:17:24.581845 systemd[1]: Stopped systemd-journald.service. Apr 12 19:17:24.581852 systemd[1]: Starting systemd-journald.service... Apr 12 19:17:24.581858 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:17:24.581867 systemd-journald[1253]: Journal started Apr 12 19:17:24.581893 systemd-journald[1253]: Runtime Journal (/run/log/journal/4eaf47c9279d44f7a7df0b25b8b76850) is 8.0M, max 639.3M, 631.3M free. Apr 12 19:17:21.310000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 19:17:21.577000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:17:21.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:17:21.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:17:21.579000 audit: BPF prog-id=10 op=LOAD Apr 12 19:17:21.579000 audit: BPF prog-id=10 op=UNLOAD Apr 12 19:17:21.579000 audit: BPF prog-id=11 op=LOAD Apr 12 19:17:21.579000 audit: BPF prog-id=11 op=UNLOAD Apr 12 19:17:21.673000 audit[1143]: AVC avc: denied { associate } for pid=1143 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:17:21.673000 audit[1143]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1126 pid=1143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:21.673000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:17:21.703000 audit[1143]: AVC avc: denied { associate } for pid=1143 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 19:17:21.703000 audit[1143]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1126 pid=1143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:21.703000 audit: CWD cwd="/" Apr 12 19:17:21.703000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:21.703000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:21.703000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:17:23.238000 audit: BPF prog-id=12 op=LOAD Apr 12 19:17:23.238000 audit: BPF prog-id=3 op=UNLOAD Apr 12 19:17:23.238000 audit: BPF prog-id=13 op=LOAD Apr 12 19:17:23.238000 audit: BPF prog-id=14 op=LOAD Apr 12 19:17:23.239000 audit: BPF prog-id=4 op=UNLOAD Apr 12 19:17:23.239000 audit: BPF prog-id=5 op=UNLOAD Apr 12 19:17:23.239000 audit: BPF prog-id=15 op=LOAD Apr 12 19:17:23.239000 audit: BPF prog-id=12 op=UNLOAD Apr 12 19:17:23.239000 audit: BPF prog-id=16 op=LOAD Apr 12 19:17:23.240000 audit: BPF prog-id=17 op=LOAD Apr 12 19:17:23.240000 audit: BPF prog-id=13 op=UNLOAD Apr 12 19:17:23.240000 audit: BPF prog-id=14 op=UNLOAD Apr 12 19:17:23.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:23.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:23.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:23.322000 audit: BPF prog-id=15 op=UNLOAD Apr 12 19:17:24.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.553000 audit: BPF prog-id=18 op=LOAD Apr 12 19:17:24.554000 audit: BPF prog-id=19 op=LOAD Apr 12 19:17:24.554000 audit: BPF prog-id=20 op=LOAD Apr 12 19:17:24.554000 audit: BPF prog-id=16 op=UNLOAD Apr 12 19:17:24.554000 audit: BPF prog-id=17 op=UNLOAD Apr 12 19:17:24.578000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 19:17:24.578000 audit[1253]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffce72a2e90 a2=4000 a3=7ffce72a2f2c items=0 ppid=1 pid=1253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:24.578000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 19:17:23.237820 systemd[1]: Queued start job for default target multi-user.target. Apr 12 19:17:21.670363 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:17:23.240991 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 19:17:21.670960 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:17:21.670992 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:17:21.671036 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 19:17:21.671053 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 19:17:21.671099 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 19:17:21.671119 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 19:17:21.671411 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 19:17:21.671473 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:17:21.671505 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:17:21.673034 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 19:17:21.673090 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 19:17:21.673121 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 19:17:21.673145 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 19:17:21.673173 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 19:17:21.673194 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 19:17:22.877681 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:17:22.877826 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:17:22.877889 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:17:22.877988 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:17:22.878017 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 19:17:22.878052 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T19:17:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 19:17:24.612534 systemd[1]: Starting systemd-network-generator.service... Apr 12 19:17:24.635662 systemd[1]: Starting systemd-remount-fs.service... Apr 12 19:17:24.656544 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:17:24.689017 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 19:17:24.689037 systemd[1]: Stopped verity-setup.service. Apr 12 19:17:24.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.723048 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:17:24.723069 kernel: kauditd_printk_skb: 60 callbacks suppressed Apr 12 19:17:24.723078 kernel: audit: type=1131 audit(1712949444.695:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.736543 systemd[1]: Started systemd-journald.service. Apr 12 19:17:24.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.799029 systemd[1]: Mounted dev-hugepages.mount. Apr 12 19:17:24.841681 kernel: audit: type=1130 audit(1712949444.798:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.847847 systemd[1]: Mounted dev-mqueue.mount. Apr 12 19:17:24.854767 systemd[1]: Mounted media.mount. Apr 12 19:17:24.861755 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 19:17:24.870744 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 19:17:24.879740 systemd[1]: Mounted tmp.mount. Apr 12 19:17:24.886828 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 19:17:24.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.894844 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:17:24.938636 kernel: audit: type=1130 audit(1712949444.894:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:24.946810 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 19:17:24.946883 systemd[1]: Finished modprobe@configfs.service. Apr 12 19:17:24.992673 kernel: audit: type=1130 audit(1712949444.946:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.000825 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 19:17:25.000906 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 19:17:25.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.048543 kernel: audit: type=1130 audit(1712949445.000:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.048575 kernel: audit: type=1131 audit(1712949445.000:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.103822 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 19:17:25.103898 systemd[1]: Finished modprobe@drm.service. Apr 12 19:17:25.153538 kernel: audit: type=1130 audit(1712949445.103:124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.153589 kernel: audit: type=1131 audit(1712949445.103:125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.211812 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 19:17:25.211890 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 19:17:25.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.263558 kernel: audit: type=1130 audit(1712949445.211:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.263579 kernel: audit: type=1131 audit(1712949445.211:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.323811 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 19:17:25.323870 systemd[1]: Finished modprobe@fuse.service. Apr 12 19:17:25.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.332818 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 19:17:25.332877 systemd[1]: Finished modprobe@loop.service. Apr 12 19:17:25.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.341819 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:17:25.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.350844 systemd[1]: Finished systemd-network-generator.service. Apr 12 19:17:25.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.359802 systemd[1]: Finished systemd-remount-fs.service. Apr 12 19:17:25.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.368804 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:17:25.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.378019 systemd[1]: Reached target network-pre.target. Apr 12 19:17:25.387740 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 19:17:25.396671 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 19:17:25.403695 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 19:17:25.405783 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 19:17:25.413050 systemd[1]: Starting systemd-journal-flush.service... Apr 12 19:17:25.416360 systemd-journald[1253]: Time spent on flushing to /var/log/journal/4eaf47c9279d44f7a7df0b25b8b76850 is 15.007ms for 1633 entries. Apr 12 19:17:25.416360 systemd-journald[1253]: System Journal (/var/log/journal/4eaf47c9279d44f7a7df0b25b8b76850) is 8.0M, max 195.6M, 187.6M free. Apr 12 19:17:25.464255 systemd-journald[1253]: Received client request to flush runtime journal. Apr 12 19:17:25.429603 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 19:17:25.430113 systemd[1]: Starting systemd-random-seed.service... Apr 12 19:17:25.447608 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 19:17:25.448136 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:17:25.455140 systemd[1]: Starting systemd-sysusers.service... Apr 12 19:17:25.462133 systemd[1]: Starting systemd-udev-settle.service... Apr 12 19:17:25.469683 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 19:17:25.477683 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 19:17:25.485730 systemd[1]: Finished systemd-journal-flush.service. Apr 12 19:17:25.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.493730 systemd[1]: Finished systemd-random-seed.service. Apr 12 19:17:25.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.501704 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:17:25.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.509704 systemd[1]: Finished systemd-sysusers.service. Apr 12 19:17:25.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.518712 systemd[1]: Reached target first-boot-complete.target. Apr 12 19:17:25.526831 udevadm[1269]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 19:17:25.709352 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 19:17:25.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.717000 audit: BPF prog-id=21 op=LOAD Apr 12 19:17:25.718000 audit: BPF prog-id=22 op=LOAD Apr 12 19:17:25.718000 audit: BPF prog-id=7 op=UNLOAD Apr 12 19:17:25.718000 audit: BPF prog-id=8 op=UNLOAD Apr 12 19:17:25.718889 systemd[1]: Starting systemd-udevd.service... Apr 12 19:17:25.730374 systemd-udevd[1270]: Using default interface naming scheme 'v252'. Apr 12 19:17:25.746824 systemd[1]: Started systemd-udevd.service. Apr 12 19:17:25.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.756522 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 19:17:25.756000 audit: BPF prog-id=23 op=LOAD Apr 12 19:17:25.757746 systemd[1]: Starting systemd-networkd.service... Apr 12 19:17:25.807038 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 19:17:25.807122 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 19:17:25.807147 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 19:17:25.806000 audit: BPF prog-id=24 op=LOAD Apr 12 19:17:25.830859 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1281) Apr 12 19:17:25.858548 kernel: ACPI: button: Power Button [PWRF] Apr 12 19:17:25.878000 audit: BPF prog-id=25 op=LOAD Apr 12 19:17:25.878000 audit: BPF prog-id=26 op=LOAD Apr 12 19:17:25.879496 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 19:17:25.879626 systemd[1]: Starting systemd-userdbd.service... Apr 12 19:17:25.920139 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:17:25.815000 audit[1337]: AVC avc: denied { confidentiality } for pid=1337 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:17:25.924495 kernel: IPMI message handler: version 39.2 Apr 12 19:17:25.947635 systemd[1]: Started systemd-userdbd.service. Apr 12 19:17:25.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:25.975545 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 19:17:25.975724 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 19:17:26.020095 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 19:17:25.815000 audit[1337]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56147f03a160 a1=4d8bc a2=7f3b86d13bc5 a3=5 items=42 ppid=1270 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:25.815000 audit: CWD cwd="/" Apr 12 19:17:25.815000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=1 name=(null) inode=20555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=2 name=(null) inode=20555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=3 name=(null) inode=20556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=4 name=(null) inode=20555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=5 name=(null) inode=20557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=6 name=(null) inode=20555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=7 name=(null) inode=20558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=8 name=(null) inode=20558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=9 name=(null) inode=20559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=10 name=(null) inode=20558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=11 name=(null) inode=20560 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=12 name=(null) inode=20558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=13 name=(null) inode=20561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=14 name=(null) inode=20558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=15 name=(null) inode=20562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=16 name=(null) inode=20558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=17 name=(null) inode=20563 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=18 name=(null) inode=20555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=19 name=(null) inode=20564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=20 name=(null) inode=20564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=21 name=(null) inode=20565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=22 name=(null) inode=20564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=23 name=(null) inode=20566 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=24 name=(null) inode=20564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=25 name=(null) inode=20567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=26 name=(null) inode=20564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=27 name=(null) inode=20568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=28 name=(null) inode=20564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=29 name=(null) inode=20569 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=30 name=(null) inode=20555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=31 name=(null) inode=20570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=32 name=(null) inode=20570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=33 name=(null) inode=20571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=34 name=(null) inode=20570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=35 name=(null) inode=20572 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=36 name=(null) inode=20570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=37 name=(null) inode=20573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=38 name=(null) inode=20570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=39 name=(null) inode=20574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=40 name=(null) inode=20570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PATH item=41 name=(null) inode=20575 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:17:25.815000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 19:17:26.044493 kernel: ipmi device interface Apr 12 19:17:26.049496 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 19:17:26.049545 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 19:17:26.049679 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 19:17:26.114495 kernel: ipmi_si: IPMI System Interface driver Apr 12 19:17:26.166505 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 19:17:26.166678 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 19:17:26.202013 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 19:17:26.224218 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 19:17:26.224330 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 19:17:26.274494 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Apr 12 19:17:26.322707 systemd-networkd[1298]: bond0: netdev ready Apr 12 19:17:26.325404 systemd-networkd[1298]: lo: Link UP Apr 12 19:17:26.325407 systemd-networkd[1298]: lo: Gained carrier Apr 12 19:17:26.325993 systemd-networkd[1298]: Enumeration completed Apr 12 19:17:26.326103 systemd[1]: Started systemd-networkd.service. Apr 12 19:17:26.326309 systemd-networkd[1298]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 19:17:26.327113 systemd-networkd[1298]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:a2:31.network. Apr 12 19:17:26.327288 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 19:17:26.327403 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 19:17:26.327418 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 19:17:26.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:26.448789 kernel: intel_rapl_common: Found RAPL domain package Apr 12 19:17:26.448840 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 19:17:26.448930 kernel: intel_rapl_common: Found RAPL domain core Apr 12 19:17:26.470540 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Apr 12 19:17:26.470625 kernel: intel_rapl_common: Found RAPL domain uncore Apr 12 19:17:26.470638 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 19:17:26.666494 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 19:17:26.688493 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 19:17:26.691753 systemd[1]: Finished systemd-udev-settle.service. Apr 12 19:17:26.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:26.701264 systemd[1]: Starting lvm2-activation-early.service... Apr 12 19:17:26.716319 lvm[1376]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:17:26.746880 systemd[1]: Finished lvm2-activation-early.service. Apr 12 19:17:26.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:26.755616 systemd[1]: Reached target cryptsetup.target. Apr 12 19:17:26.764137 systemd[1]: Starting lvm2-activation.service... Apr 12 19:17:26.766277 lvm[1377]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:17:26.796914 systemd[1]: Finished lvm2-activation.service. Apr 12 19:17:26.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:26.806616 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:17:26.815571 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 19:17:26.815586 systemd[1]: Reached target local-fs.target. Apr 12 19:17:26.823569 systemd[1]: Reached target machines.target. Apr 12 19:17:26.832158 systemd[1]: Starting ldconfig.service... Apr 12 19:17:26.839252 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 19:17:26.839272 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:17:26.839803 systemd[1]: Starting systemd-boot-update.service... Apr 12 19:17:26.847155 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 19:17:26.857135 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 19:17:26.857297 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:17:26.857327 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:17:26.857987 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 19:17:26.858274 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1379 (bootctl) Apr 12 19:17:26.859022 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 19:17:26.878937 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 19:17:26.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:26.936563 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 19:17:26.962494 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Apr 12 19:17:26.962919 systemd-networkd[1298]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:a2:30.network. Apr 12 19:17:26.983696 systemd-tmpfiles[1383]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 19:17:27.004493 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:17:27.127582 systemd-tmpfiles[1383]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 19:17:27.142535 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:17:27.142607 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Apr 12 19:17:27.186525 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Apr 12 19:17:27.186572 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 19:17:27.214563 systemd-tmpfiles[1383]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 19:17:27.246182 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 19:17:27.246277 kernel: bond0: active interface up! Apr 12 19:17:27.246955 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 19:17:27.247378 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 19:17:27.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:27.267991 systemd-fsck[1387]: fsck.fat 4.2 (2021-01-31) Apr 12 19:17:27.267991 systemd-fsck[1387]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 19:17:27.267997 systemd-networkd[1298]: bond0: Link UP Apr 12 19:17:27.268204 systemd-networkd[1298]: enp2s0f1np1: Link UP Apr 12 19:17:27.268342 systemd-networkd[1298]: enp2s0f1np1: Gained carrier Apr 12 19:17:27.268491 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 19:17:27.269421 systemd-networkd[1298]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:a2:30.network. Apr 12 19:17:27.276959 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 19:17:27.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:27.289367 systemd[1]: Mounting boot.mount... Apr 12 19:17:27.302100 systemd[1]: Mounted boot.mount. Apr 12 19:17:27.324111 systemd[1]: Finished systemd-boot-update.service. Apr 12 19:17:27.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:27.353308 systemd-networkd[1298]: enp2s0f0np0: Link UP Apr 12 19:17:27.353491 systemd-networkd[1298]: bond0: Gained carrier Apr 12 19:17:27.353580 systemd-networkd[1298]: enp2s0f0np0: Gained carrier Apr 12 19:17:27.354494 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 19:17:27.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:27.363299 systemd[1]: Starting audit-rules.service... Apr 12 19:17:27.363824 systemd-networkd[1298]: enp2s0f1np1: Link DOWN Apr 12 19:17:27.363827 systemd-networkd[1298]: enp2s0f1np1: Lost carrier Apr 12 19:17:27.371124 systemd[1]: Starting clean-ca-certificates.service... Apr 12 19:17:27.383056 augenrules[1408]: No rules Apr 12 19:17:27.382000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 19:17:27.382000 audit[1408]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd166bb320 a2=420 a3=0 items=0 ppid=1392 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:27.382000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 19:17:27.389027 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 19:17:27.395493 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.418494 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.418571 systemd[1]: Starting systemd-resolved.service... Apr 12 19:17:27.441493 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.441856 systemd[1]: Starting systemd-timesyncd.service... Apr 12 19:17:27.451534 ldconfig[1378]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 19:17:27.458144 systemd[1]: Starting systemd-update-utmp.service... Apr 12 19:17:27.464493 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.479848 systemd[1]: Finished ldconfig.service. Apr 12 19:17:27.485496 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.500715 systemd[1]: Finished audit-rules.service. Apr 12 19:17:27.507492 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.522684 systemd[1]: Finished clean-ca-certificates.service. Apr 12 19:17:27.529493 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.529514 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 19:17:27.544493 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:17:27.547702 systemd-networkd[1298]: enp2s0f1np1: Link UP Apr 12 19:17:27.548121 systemd-networkd[1298]: enp2s0f1np1: Gained carrier Apr 12 19:17:27.562490 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Apr 12 19:17:27.586691 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 19:17:27.598215 systemd[1]: Finished systemd-update-utmp.service. Apr 12 19:17:27.607217 systemd[1]: Starting systemd-update-done.service... Apr 12 19:17:27.613588 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 19:17:27.613746 systemd[1]: Finished systemd-update-done.service. Apr 12 19:17:27.623626 systemd[1]: Started systemd-timesyncd.service. Apr 12 19:17:27.626905 systemd-resolved[1414]: Positive Trust Anchors: Apr 12 19:17:27.626911 systemd-resolved[1414]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:17:27.626932 systemd-resolved[1414]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:17:27.630809 systemd-resolved[1414]: Using system hostname 'ci-3510.3.3-a-a88028f4fa'. Apr 12 19:17:27.631631 systemd[1]: Reached target time-set.target. Apr 12 19:17:27.639538 systemd[1]: Started systemd-resolved.service. Apr 12 19:17:27.647545 systemd[1]: Reached target network.target. Apr 12 19:17:27.655521 systemd[1]: Reached target nss-lookup.target. Apr 12 19:17:27.663523 systemd[1]: Reached target sysinit.target. Apr 12 19:17:27.678657 systemd[1]: Started motdgen.path. Apr 12 19:17:27.686491 kernel: bond0: (slave enp2s0f1np1): link status up again after 100 ms Apr 12 19:17:27.700653 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 19:17:27.707490 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 19:17:27.715594 systemd[1]: Started logrotate.timer. Apr 12 19:17:27.722560 systemd[1]: Started mdadm.timer. Apr 12 19:17:27.729526 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 19:17:27.737519 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 19:17:27.737535 systemd[1]: Reached target paths.target. Apr 12 19:17:27.744519 systemd[1]: Reached target timers.target. Apr 12 19:17:27.751644 systemd[1]: Listening on dbus.socket. Apr 12 19:17:27.759069 systemd[1]: Starting docker.socket... Apr 12 19:17:27.766933 systemd[1]: Listening on sshd.socket. Apr 12 19:17:27.773571 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:17:27.773783 systemd[1]: Listening on docker.socket. Apr 12 19:17:27.780570 systemd[1]: Reached target sockets.target. Apr 12 19:17:27.788523 systemd[1]: Reached target basic.target. Apr 12 19:17:27.795541 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:17:27.795554 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:17:27.795992 systemd[1]: Starting containerd.service... Apr 12 19:17:27.802912 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 19:17:27.810955 systemd[1]: Starting coreos-metadata.service... Apr 12 19:17:27.818046 systemd[1]: Starting dbus.service... Apr 12 19:17:27.824053 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 19:17:27.828158 jq[1430]: false Apr 12 19:17:27.831026 systemd[1]: Starting extend-filesystems.service... Apr 12 19:17:27.831991 coreos-metadata[1423]: Apr 12 19:17:27.831 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:17:27.836722 dbus-daemon[1429]: [system] SELinux support is enabled Apr 12 19:17:27.837597 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 19:17:27.838169 systemd[1]: Starting motdgen.service... Apr 12 19:17:27.838841 extend-filesystems[1431]: Found sda Apr 12 19:17:27.838841 extend-filesystems[1431]: Found sda1 Apr 12 19:17:27.881567 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Apr 12 19:17:27.845196 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 19:17:27.881673 coreos-metadata[1426]: Apr 12 19:17:27.839 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:17:27.881775 extend-filesystems[1431]: Found sda2 Apr 12 19:17:27.881775 extend-filesystems[1431]: Found sda3 Apr 12 19:17:27.881775 extend-filesystems[1431]: Found usr Apr 12 19:17:27.881775 extend-filesystems[1431]: Found sda4 Apr 12 19:17:27.881775 extend-filesystems[1431]: Found sda6 Apr 12 19:17:27.881775 extend-filesystems[1431]: Found sda7 Apr 12 19:17:27.881775 extend-filesystems[1431]: Found sda9 Apr 12 19:17:27.881775 extend-filesystems[1431]: Checking size of /dev/sda9 Apr 12 19:17:27.881775 extend-filesystems[1431]: Resized partition /dev/sda9 Apr 12 19:17:27.874303 systemd[1]: Starting prepare-critools.service... Apr 12 19:17:27.975630 extend-filesystems[1447]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 19:17:27.889112 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 19:17:27.909038 systemd[1]: Starting sshd-keygen.service... Apr 12 19:17:27.928751 systemd[1]: Starting systemd-logind.service... Apr 12 19:17:27.946558 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:17:27.947045 systemd[1]: Starting tcsd.service... Apr 12 19:17:27.990993 jq[1462]: true Apr 12 19:17:27.950715 systemd-logind[1459]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 19:17:27.950725 systemd-logind[1459]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 19:17:27.950735 systemd-logind[1459]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 19:17:27.950830 systemd-logind[1459]: New seat seat0. Apr 12 19:17:27.966817 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 19:17:27.967183 systemd[1]: Starting update-engine.service... Apr 12 19:17:27.983207 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 19:17:27.998883 systemd[1]: Started dbus.service. Apr 12 19:17:28.007237 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 19:17:28.007326 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 19:17:28.007502 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 19:17:28.007584 systemd[1]: Finished motdgen.service. Apr 12 19:17:28.015331 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 19:17:28.015416 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 19:17:28.017145 update_engine[1461]: I0412 19:17:28.016734 1461 main.cc:92] Flatcar Update Engine starting Apr 12 19:17:28.020356 update_engine[1461]: I0412 19:17:28.020346 1461 update_check_scheduler.cc:74] Next update check in 8m7s Apr 12 19:17:28.020864 tar[1464]: ./ Apr 12 19:17:28.020864 tar[1464]: ./loopback Apr 12 19:17:28.026375 jq[1468]: true Apr 12 19:17:28.026723 dbus-daemon[1429]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 19:17:28.027684 tar[1465]: crictl Apr 12 19:17:28.032389 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 19:17:28.032481 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 19:17:28.033757 systemd[1]: Started update-engine.service. Apr 12 19:17:28.034869 env[1469]: time="2024-04-12T19:17:28.034840912Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 19:17:28.039334 tar[1464]: ./bandwidth Apr 12 19:17:28.046569 systemd[1]: Started systemd-logind.service. Apr 12 19:17:28.048277 env[1469]: time="2024-04-12T19:17:28.048254857Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 19:17:28.048356 env[1469]: time="2024-04-12T19:17:28.048345118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:17:28.048964 env[1469]: time="2024-04-12T19:17:28.048944441Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049000 env[1469]: time="2024-04-12T19:17:28.048964269Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049127 env[1469]: time="2024-04-12T19:17:28.049112075Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049159 env[1469]: time="2024-04-12T19:17:28.049128300Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049159 env[1469]: time="2024-04-12T19:17:28.049139849Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 19:17:28.049159 env[1469]: time="2024-04-12T19:17:28.049148915Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049242 env[1469]: time="2024-04-12T19:17:28.049202986Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049382 env[1469]: time="2024-04-12T19:17:28.049370202Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049484 env[1469]: time="2024-04-12T19:17:28.049470991Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:17:28.049520 env[1469]: time="2024-04-12T19:17:28.049485531Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 19:17:28.054267 env[1469]: time="2024-04-12T19:17:28.054253387Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 19:17:28.054316 env[1469]: time="2024-04-12T19:17:28.054266769Z" level=info msg="metadata content store policy set" policy=shared Apr 12 19:17:28.057235 systemd[1]: Started locksmithd.service. Apr 12 19:17:28.063605 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 19:17:28.063680 systemd[1]: Reached target system-config.target. Apr 12 19:17:28.071583 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 19:17:28.071660 systemd[1]: Reached target user-config.target. Apr 12 19:17:28.124062 locksmithd[1504]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 19:17:28.124337 tar[1464]: ./ptp Apr 12 19:17:28.125243 env[1469]: time="2024-04-12T19:17:28.125214484Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 19:17:28.125282 env[1469]: time="2024-04-12T19:17:28.125246732Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 19:17:28.125282 env[1469]: time="2024-04-12T19:17:28.125255280Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 19:17:28.125282 env[1469]: time="2024-04-12T19:17:28.125274430Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125364 bash[1496]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125283327Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125291092Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125298628Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125306082Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125313166Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125320864Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125327669Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125335087Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 19:17:28.125436 env[1469]: time="2024-04-12T19:17:28.125396927Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 19:17:28.125652 env[1469]: time="2024-04-12T19:17:28.125443994Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 19:17:28.125652 env[1469]: time="2024-04-12T19:17:28.125581315Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 19:17:28.125652 env[1469]: time="2024-04-12T19:17:28.125598806Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125652 env[1469]: time="2024-04-12T19:17:28.125609479Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 19:17:28.125652 env[1469]: time="2024-04-12T19:17:28.125641384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125652 env[1469]: time="2024-04-12T19:17:28.125651436Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125813 env[1469]: time="2024-04-12T19:17:28.125658455Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125813 env[1469]: time="2024-04-12T19:17:28.125664558Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125813 env[1469]: time="2024-04-12T19:17:28.125670943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125813 env[1469]: time="2024-04-12T19:17:28.125677177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125813 env[1469]: time="2024-04-12T19:17:28.125683425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125813 env[1469]: time="2024-04-12T19:17:28.125689654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.125813 env[1469]: time="2024-04-12T19:17:28.125776694Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 19:17:28.125651 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125842536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125851694Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125858834Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125865234Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125873501Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125880162Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125892181Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 19:17:28.126027 env[1469]: time="2024-04-12T19:17:28.125913743Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 19:17:28.126221 env[1469]: time="2024-04-12T19:17:28.126030104Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 19:17:28.126221 env[1469]: time="2024-04-12T19:17:28.126061767Z" level=info msg="Connect containerd service" Apr 12 19:17:28.126221 env[1469]: time="2024-04-12T19:17:28.126080007Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126379039Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126644702Z" level=info msg="Start subscribing containerd event" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126699334Z" level=info msg="Start recovering state" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126751722Z" level=info msg="Start event monitor" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126784427Z" level=info msg="Start snapshots syncer" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126806614Z" level=info msg="Start cni network conf syncer for default" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126804934Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126814278Z" level=info msg="Start streaming server" Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126861489Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 19:17:28.128925 env[1469]: time="2024-04-12T19:17:28.126901190Z" level=info msg="containerd successfully booted in 0.092434s" Apr 12 19:17:28.135749 systemd[1]: Started containerd.service. Apr 12 19:17:28.147690 tar[1464]: ./vlan Apr 12 19:17:28.170072 tar[1464]: ./host-device Apr 12 19:17:28.191787 tar[1464]: ./tuning Apr 12 19:17:28.210998 tar[1464]: ./vrf Apr 12 19:17:28.231075 tar[1464]: ./sbr Apr 12 19:17:28.250686 tar[1464]: ./tap Apr 12 19:17:28.269594 sshd_keygen[1458]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 19:17:28.273165 tar[1464]: ./dhcp Apr 12 19:17:28.281668 systemd[1]: Finished sshd-keygen.service. Apr 12 19:17:28.290439 systemd[1]: Starting issuegen.service... Apr 12 19:17:28.298778 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 19:17:28.298857 systemd[1]: Finished issuegen.service. Apr 12 19:17:28.307471 systemd[1]: Starting systemd-user-sessions.service... Apr 12 19:17:28.316765 systemd[1]: Finished systemd-user-sessions.service. Apr 12 19:17:28.326429 systemd[1]: Started getty@tty1.service. Apr 12 19:17:28.330264 tar[1464]: ./static Apr 12 19:17:28.334289 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 19:17:28.342672 systemd[1]: Reached target getty.target. Apr 12 19:17:28.346463 tar[1464]: ./firewall Apr 12 19:17:28.352376 systemd[1]: Finished prepare-critools.service. Apr 12 19:17:28.371385 tar[1464]: ./macvlan Apr 12 19:17:28.393742 tar[1464]: ./dummy Apr 12 19:17:28.415942 tar[1464]: ./bridge Apr 12 19:17:28.440296 tar[1464]: ./ipvlan Apr 12 19:17:28.462401 tar[1464]: ./portmap Apr 12 19:17:28.483147 tar[1464]: ./host-local Apr 12 19:17:28.507191 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 19:17:28.572563 systemd-networkd[1298]: bond0: Gained IPv6LL Apr 12 19:17:29.458494 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Apr 12 19:17:29.490329 extend-filesystems[1447]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 19:17:29.490329 extend-filesystems[1447]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 19:17:29.490329 extend-filesystems[1447]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Apr 12 19:17:29.528537 extend-filesystems[1431]: Resized filesystem in /dev/sda9 Apr 12 19:17:29.528537 extend-filesystems[1431]: Found sdb Apr 12 19:17:29.490842 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 19:17:29.490926 systemd[1]: Finished extend-filesystems.service. Apr 12 19:17:30.092678 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 19:17:33.371981 login[1525]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 19:17:33.372523 login[1524]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 19:17:33.378839 systemd[1]: Created slice user-500.slice. Apr 12 19:17:33.379430 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 19:17:33.380425 systemd-logind[1459]: New session 2 of user core. Apr 12 19:17:33.384764 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 19:17:33.385468 systemd[1]: Starting user@500.service... Apr 12 19:17:33.387249 (systemd)[1533]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:33.455823 systemd[1533]: Queued start job for default target default.target. Apr 12 19:17:33.456064 systemd[1533]: Reached target paths.target. Apr 12 19:17:33.456076 systemd[1533]: Reached target sockets.target. Apr 12 19:17:33.456085 systemd[1533]: Reached target timers.target. Apr 12 19:17:33.456092 systemd[1533]: Reached target basic.target. Apr 12 19:17:33.456112 systemd[1533]: Reached target default.target. Apr 12 19:17:33.456127 systemd[1533]: Startup finished in 65ms. Apr 12 19:17:33.456174 systemd[1]: Started user@500.service. Apr 12 19:17:33.456746 systemd[1]: Started session-2.scope. Apr 12 19:17:33.757996 coreos-metadata[1423]: Apr 12 19:17:33.757 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 19:17:33.758774 coreos-metadata[1426]: Apr 12 19:17:33.757 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 19:17:34.378002 login[1525]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 19:17:34.380947 systemd-logind[1459]: New session 1 of user core. Apr 12 19:17:34.381377 systemd[1]: Started session-1.scope. Apr 12 19:17:34.758149 coreos-metadata[1426]: Apr 12 19:17:34.757 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 19:17:34.758380 coreos-metadata[1423]: Apr 12 19:17:34.757 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 19:17:35.314789 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Apr 12 19:17:35.314944 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Apr 12 19:17:35.813249 systemd[1]: Created slice system-sshd.slice. Apr 12 19:17:35.813844 systemd[1]: Started sshd@0-139.178.89.219:22-147.75.109.163:46858.service. Apr 12 19:17:35.828632 coreos-metadata[1426]: Apr 12 19:17:35.828 INFO Fetch successful Apr 12 19:17:35.829451 coreos-metadata[1423]: Apr 12 19:17:35.828 INFO Fetch successful Apr 12 19:17:35.854833 systemd[1]: Finished coreos-metadata.service. Apr 12 19:17:35.855577 systemd[1]: Started packet-phone-home.service. Apr 12 19:17:35.855761 unknown[1423]: wrote ssh authorized keys file for user: core Apr 12 19:17:35.862002 sshd[1554]: Accepted publickey for core from 147.75.109.163 port 46858 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 19:17:35.862767 sshd[1554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:35.864244 curl[1558]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 19:17:35.864387 curl[1558]: Dload Upload Total Spent Left Speed Apr 12 19:17:35.865192 systemd-logind[1459]: New session 3 of user core. Apr 12 19:17:35.865652 systemd[1]: Started session-3.scope. Apr 12 19:17:35.868762 update-ssh-keys[1559]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:17:35.868971 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 19:17:35.869195 systemd[1]: Reached target multi-user.target. Apr 12 19:17:35.869859 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 19:17:35.873782 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 19:17:35.873852 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 19:17:35.873995 systemd[1]: Startup finished in 2.021s (kernel) + 19.135s (initrd) + 14.908s (userspace) = 36.065s. Apr 12 19:17:35.913583 systemd[1]: Started sshd@1-139.178.89.219:22-147.75.109.163:46870.service. Apr 12 19:17:35.946953 sshd[1565]: Accepted publickey for core from 147.75.109.163 port 46870 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 19:17:35.947675 sshd[1565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:35.949725 systemd-logind[1459]: New session 4 of user core. Apr 12 19:17:35.950145 systemd[1]: Started session-4.scope. Apr 12 19:17:36.000602 sshd[1565]: pam_unix(sshd:session): session closed for user core Apr 12 19:17:36.002060 systemd[1]: sshd@1-139.178.89.219:22-147.75.109.163:46870.service: Deactivated successfully. Apr 12 19:17:36.002364 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 19:17:36.002746 systemd-logind[1459]: Session 4 logged out. Waiting for processes to exit. Apr 12 19:17:36.003234 systemd[1]: Started sshd@2-139.178.89.219:22-147.75.109.163:46872.service. Apr 12 19:17:36.003666 systemd-logind[1459]: Removed session 4. Apr 12 19:17:36.035528 sshd[1571]: Accepted publickey for core from 147.75.109.163 port 46872 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 19:17:36.036370 sshd[1571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:36.039334 systemd-logind[1459]: New session 5 of user core. Apr 12 19:17:36.039949 systemd[1]: Started session-5.scope. Apr 12 19:17:36.045238 curl[1558]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 19:17:36.045907 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 19:17:36.091286 sshd[1571]: pam_unix(sshd:session): session closed for user core Apr 12 19:17:36.092954 systemd[1]: sshd@2-139.178.89.219:22-147.75.109.163:46872.service: Deactivated successfully. Apr 12 19:17:36.093243 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 19:17:36.093502 systemd-logind[1459]: Session 5 logged out. Waiting for processes to exit. Apr 12 19:17:36.094023 systemd[1]: Started sshd@3-139.178.89.219:22-147.75.109.163:46880.service. Apr 12 19:17:36.094377 systemd-logind[1459]: Removed session 5. Apr 12 19:17:36.126151 sshd[1577]: Accepted publickey for core from 147.75.109.163 port 46880 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 19:17:36.127065 sshd[1577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:36.130186 systemd-logind[1459]: New session 6 of user core. Apr 12 19:17:36.130787 systemd[1]: Started session-6.scope. Apr 12 19:17:36.173124 systemd-timesyncd[1415]: Contacted time server 23.168.24.210:123 (0.flatcar.pool.ntp.org). Apr 12 19:17:36.173260 systemd-timesyncd[1415]: Initial clock synchronization to Fri 2024-04-12 19:17:35.884837 UTC. Apr 12 19:17:36.185022 sshd[1577]: pam_unix(sshd:session): session closed for user core Apr 12 19:17:36.186468 systemd[1]: sshd@3-139.178.89.219:22-147.75.109.163:46880.service: Deactivated successfully. Apr 12 19:17:36.186800 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 19:17:36.187170 systemd-logind[1459]: Session 6 logged out. Waiting for processes to exit. Apr 12 19:17:36.187682 systemd[1]: Started sshd@4-139.178.89.219:22-147.75.109.163:46896.service. Apr 12 19:17:36.188178 systemd-logind[1459]: Removed session 6. Apr 12 19:17:36.219712 sshd[1583]: Accepted publickey for core from 147.75.109.163 port 46896 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 19:17:36.220526 sshd[1583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:36.223270 systemd-logind[1459]: New session 7 of user core. Apr 12 19:17:36.223871 systemd[1]: Started session-7.scope. Apr 12 19:17:36.295761 sudo[1586]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 19:17:36.296371 sudo[1586]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:17:36.315975 dbus-daemon[1429]: \xd0\xcdl\xfa\u0019V: received setenforce notice (enforcing=-331683584) Apr 12 19:17:36.321100 sudo[1586]: pam_unix(sudo:session): session closed for user root Apr 12 19:17:36.330640 sshd[1583]: pam_unix(sshd:session): session closed for user core Apr 12 19:17:36.337121 systemd[1]: sshd@4-139.178.89.219:22-147.75.109.163:46896.service: Deactivated successfully. Apr 12 19:17:36.338869 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 19:17:36.340617 systemd-logind[1459]: Session 7 logged out. Waiting for processes to exit. Apr 12 19:17:36.343278 systemd[1]: Started sshd@5-139.178.89.219:22-147.75.109.163:46910.service. Apr 12 19:17:36.345720 systemd-logind[1459]: Removed session 7. Apr 12 19:17:36.401050 sshd[1590]: Accepted publickey for core from 147.75.109.163 port 46910 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 19:17:36.401706 sshd[1590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:36.403911 systemd-logind[1459]: New session 8 of user core. Apr 12 19:17:36.404296 systemd[1]: Started session-8.scope. Apr 12 19:17:36.453768 sudo[1594]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 19:17:36.453990 sudo[1594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:17:36.456861 sudo[1594]: pam_unix(sudo:session): session closed for user root Apr 12 19:17:36.461840 sudo[1593]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 19:17:36.462087 sudo[1593]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:17:36.476275 systemd[1]: Stopping audit-rules.service... Apr 12 19:17:36.478000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:17:36.478982 auditctl[1597]: No rules Apr 12 19:17:36.479833 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 19:17:36.480255 systemd[1]: Stopped audit-rules.service. Apr 12 19:17:36.484052 systemd[1]: Starting audit-rules.service... Apr 12 19:17:36.484431 kernel: kauditd_printk_skb: 83 callbacks suppressed Apr 12 19:17:36.484568 kernel: audit: type=1305 audit(1712949456.478:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:17:36.478000 audit[1597]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbc8a8590 a2=420 a3=0 items=0 ppid=1 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:36.526312 augenrules[1614]: No rules Apr 12 19:17:36.526861 systemd[1]: Finished audit-rules.service. Apr 12 19:17:36.527583 sudo[1593]: pam_unix(sudo:session): session closed for user root Apr 12 19:17:36.528690 sshd[1590]: pam_unix(sshd:session): session closed for user core Apr 12 19:17:36.530771 systemd[1]: sshd@5-139.178.89.219:22-147.75.109.163:46910.service: Deactivated successfully. Apr 12 19:17:36.531230 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 19:17:36.531741 kernel: audit: type=1300 audit(1712949456.478:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbc8a8590 a2=420 a3=0 items=0 ppid=1 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:36.531792 kernel: audit: type=1327 audit(1712949456.478:164): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:17:36.478000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:17:36.531822 systemd-logind[1459]: Session 8 logged out. Waiting for processes to exit. Apr 12 19:17:36.532591 systemd[1]: Started sshd@6-139.178.89.219:22-147.75.109.163:46924.service. Apr 12 19:17:36.533312 systemd-logind[1459]: Removed session 8. Apr 12 19:17:36.541292 kernel: audit: type=1131 audit(1712949456.479:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.563740 kernel: audit: type=1130 audit(1712949456.526:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.586186 kernel: audit: type=1106 audit(1712949456.527:167): pid=1593 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.527000 audit[1593]: USER_END pid=1593 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.589646 sshd[1620]: Accepted publickey for core from 147.75.109.163 port 46924 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 19:17:36.591872 sshd[1620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:17:36.594279 systemd-logind[1459]: New session 9 of user core. Apr 12 19:17:36.594686 systemd[1]: Started session-9.scope. Apr 12 19:17:36.612157 kernel: audit: type=1104 audit(1712949456.527:168): pid=1593 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.527000 audit[1593]: CRED_DISP pid=1593 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.635715 kernel: audit: type=1106 audit(1712949456.529:169): pid=1590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.529000 audit[1590]: USER_END pid=1590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.642636 sudo[1623]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 19:17:36.642750 sudo[1623]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:17:36.667969 kernel: audit: type=1104 audit(1712949456.529:170): pid=1590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.529000 audit[1590]: CRED_DISP pid=1590 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.693901 kernel: audit: type=1131 audit(1712949456.530:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.89.219:22-147.75.109.163:46910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.89.219:22-147.75.109.163:46910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.219:22-147.75.109.163:46924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.589000 audit[1620]: USER_ACCT pid=1620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.591000 audit[1620]: CRED_ACQ pid=1620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.591000 audit[1620]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5d2e6790 a2=3 a3=0 items=0 ppid=1 pid=1620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:36.591000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:17:36.597000 audit[1620]: USER_START pid=1620 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.597000 audit[1622]: CRED_ACQ pid=1622 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:36.642000 audit[1623]: USER_ACCT pid=1623 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.642000 audit[1623]: CRED_REFR pid=1623 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:36.643000 audit[1623]: USER_START pid=1623 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:37.483970 systemd[1]: Reloading. Apr 12 19:17:37.513684 /usr/lib/systemd/system-generators/torcx-generator[1653]: time="2024-04-12T19:17:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:17:37.513700 /usr/lib/systemd/system-generators/torcx-generator[1653]: time="2024-04-12T19:17:37Z" level=info msg="torcx already run" Apr 12 19:17:37.562547 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:17:37.562554 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:17:37.573285 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.614000 audit: BPF prog-id=34 op=LOAD Apr 12 19:17:37.614000 audit: BPF prog-id=32 op=UNLOAD Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit: BPF prog-id=35 op=LOAD Apr 12 19:17:37.615000 audit: BPF prog-id=24 op=UNLOAD Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit: BPF prog-id=36 op=LOAD Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit: BPF prog-id=37 op=LOAD Apr 12 19:17:37.615000 audit: BPF prog-id=25 op=UNLOAD Apr 12 19:17:37.615000 audit: BPF prog-id=26 op=UNLOAD Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.615000 audit: BPF prog-id=38 op=LOAD Apr 12 19:17:37.615000 audit: BPF prog-id=28 op=UNLOAD Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.616000 audit: BPF prog-id=39 op=LOAD Apr 12 19:17:37.616000 audit: BPF prog-id=27 op=UNLOAD Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit: BPF prog-id=40 op=LOAD Apr 12 19:17:37.617000 audit: BPF prog-id=18 op=UNLOAD Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit: BPF prog-id=41 op=LOAD Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.617000 audit: BPF prog-id=42 op=LOAD Apr 12 19:17:37.617000 audit: BPF prog-id=19 op=UNLOAD Apr 12 19:17:37.617000 audit: BPF prog-id=20 op=UNLOAD Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit: BPF prog-id=43 op=LOAD Apr 12 19:17:37.618000 audit: BPF prog-id=23 op=UNLOAD Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit: BPF prog-id=44 op=LOAD Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit: BPF prog-id=45 op=LOAD Apr 12 19:17:37.619000 audit: BPF prog-id=21 op=UNLOAD Apr 12 19:17:37.619000 audit: BPF prog-id=22 op=UNLOAD Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit: BPF prog-id=46 op=LOAD Apr 12 19:17:37.620000 audit: BPF prog-id=29 op=UNLOAD Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit: BPF prog-id=47 op=LOAD Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:37.620000 audit: BPF prog-id=48 op=LOAD Apr 12 19:17:37.620000 audit: BPF prog-id=30 op=UNLOAD Apr 12 19:17:37.620000 audit: BPF prog-id=31 op=UNLOAD Apr 12 19:17:37.626059 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 19:17:37.629804 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 19:17:37.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:37.630053 systemd[1]: Reached target network-online.target. Apr 12 19:17:37.630675 systemd[1]: Started kubelet.service. Apr 12 19:17:37.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:37.653598 kubelet[1714]: E0412 19:17:37.653574 1714 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 19:17:37.654747 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:17:37.654813 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:17:37.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:17:38.067189 systemd[1]: Stopped kubelet.service. Apr 12 19:17:38.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:38.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:38.076610 systemd[1]: Reloading. Apr 12 19:17:38.116167 /usr/lib/systemd/system-generators/torcx-generator[1816]: time="2024-04-12T19:17:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:17:38.116188 /usr/lib/systemd/system-generators/torcx-generator[1816]: time="2024-04-12T19:17:38Z" level=info msg="torcx already run" Apr 12 19:17:38.192604 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:17:38.192616 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:17:38.207173 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit: BPF prog-id=49 op=LOAD Apr 12 19:17:38.252000 audit: BPF prog-id=34 op=UNLOAD Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit: BPF prog-id=50 op=LOAD Apr 12 19:17:38.252000 audit: BPF prog-id=35 op=UNLOAD Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit: BPF prog-id=51 op=LOAD Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit: BPF prog-id=52 op=LOAD Apr 12 19:17:38.252000 audit: BPF prog-id=36 op=UNLOAD Apr 12 19:17:38.252000 audit: BPF prog-id=37 op=UNLOAD Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.253000 audit: BPF prog-id=53 op=LOAD Apr 12 19:17:38.253000 audit: BPF prog-id=38 op=UNLOAD Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit: BPF prog-id=54 op=LOAD Apr 12 19:17:38.254000 audit: BPF prog-id=39 op=UNLOAD Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit: BPF prog-id=55 op=LOAD Apr 12 19:17:38.254000 audit: BPF prog-id=40 op=UNLOAD Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit: BPF prog-id=56 op=LOAD Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.254000 audit: BPF prog-id=57 op=LOAD Apr 12 19:17:38.254000 audit: BPF prog-id=41 op=UNLOAD Apr 12 19:17:38.254000 audit: BPF prog-id=42 op=UNLOAD Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit: BPF prog-id=58 op=LOAD Apr 12 19:17:38.255000 audit: BPF prog-id=43 op=UNLOAD Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit: BPF prog-id=59 op=LOAD Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.255000 audit: BPF prog-id=60 op=LOAD Apr 12 19:17:38.255000 audit: BPF prog-id=44 op=UNLOAD Apr 12 19:17:38.255000 audit: BPF prog-id=45 op=UNLOAD Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit: BPF prog-id=61 op=LOAD Apr 12 19:17:38.256000 audit: BPF prog-id=46 op=UNLOAD Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit: BPF prog-id=62 op=LOAD Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.257000 audit: BPF prog-id=63 op=LOAD Apr 12 19:17:38.257000 audit: BPF prog-id=47 op=UNLOAD Apr 12 19:17:38.257000 audit: BPF prog-id=48 op=UNLOAD Apr 12 19:17:38.263682 systemd[1]: Started kubelet.service. Apr 12 19:17:38.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:38.283001 kubelet[1875]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:17:38.283001 kubelet[1875]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:17:38.283001 kubelet[1875]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:17:38.283001 kubelet[1875]: I0412 19:17:38.282991 1875 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:17:38.463019 kubelet[1875]: I0412 19:17:38.462956 1875 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 19:17:38.463019 kubelet[1875]: I0412 19:17:38.462968 1875 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:17:38.463081 kubelet[1875]: I0412 19:17:38.463063 1875 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 19:17:38.464686 kubelet[1875]: I0412 19:17:38.464655 1875 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:17:38.485317 kubelet[1875]: I0412 19:17:38.485307 1875 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:17:38.485454 kubelet[1875]: I0412 19:17:38.485449 1875 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:17:38.485605 kubelet[1875]: I0412 19:17:38.485598 1875 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 19:17:38.485668 kubelet[1875]: I0412 19:17:38.485611 1875 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 19:17:38.485668 kubelet[1875]: I0412 19:17:38.485617 1875 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 19:17:38.485668 kubelet[1875]: I0412 19:17:38.485667 1875 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:17:38.485720 kubelet[1875]: I0412 19:17:38.485706 1875 kubelet.go:396] "Attempting to sync node with API server" Apr 12 19:17:38.485720 kubelet[1875]: I0412 19:17:38.485713 1875 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:17:38.485765 kubelet[1875]: I0412 19:17:38.485725 1875 kubelet.go:312] "Adding apiserver pod source" Apr 12 19:17:38.485765 kubelet[1875]: I0412 19:17:38.485731 1875 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:17:38.485794 kubelet[1875]: E0412 19:17:38.485783 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:38.485848 kubelet[1875]: E0412 19:17:38.485826 1875 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:38.486118 kubelet[1875]: I0412 19:17:38.486049 1875 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:17:38.486257 kubelet[1875]: I0412 19:17:38.486228 1875 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 19:17:38.486312 kubelet[1875]: W0412 19:17:38.486267 1875 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 19:17:38.486724 kubelet[1875]: I0412 19:17:38.486669 1875 server.go:1256] "Started kubelet" Apr 12 19:17:38.486724 kubelet[1875]: I0412 19:17:38.486691 1875 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:17:38.486793 kubelet[1875]: I0412 19:17:38.486761 1875 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 19:17:38.486892 kubelet[1875]: I0412 19:17:38.486883 1875 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 19:17:38.485000 audit[1875]: AVC avc: denied { mac_admin } for pid=1875 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.485000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:17:38.485000 audit[1875]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ca0db0 a1=c000c806c0 a2=c000ca0d80 a3=25 items=0 ppid=1 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.485000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:17:38.485000 audit[1875]: AVC avc: denied { mac_admin } for pid=1875 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.485000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:17:38.485000 audit[1875]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c94480 a1=c000c806d8 a2=c000ca0e40 a3=25 items=0 ppid=1 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.485000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:17:38.487467 kubelet[1875]: I0412 19:17:38.487199 1875 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:17:38.487467 kubelet[1875]: I0412 19:17:38.487217 1875 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:17:38.487467 kubelet[1875]: I0412 19:17:38.487247 1875 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:17:38.487467 kubelet[1875]: E0412 19:17:38.487279 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:38.487467 kubelet[1875]: I0412 19:17:38.487280 1875 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 19:17:38.487899 kubelet[1875]: I0412 19:17:38.487880 1875 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 19:17:38.487938 kubelet[1875]: I0412 19:17:38.487901 1875 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 19:17:38.488069 kubelet[1875]: I0412 19:17:38.488062 1875 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:17:38.488289 kubelet[1875]: E0412 19:17:38.488279 1875 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:17:38.488520 kubelet[1875]: I0412 19:17:38.488494 1875 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 19:17:38.489716 kubelet[1875]: I0412 19:17:38.489707 1875 factory.go:221] Registration of the containerd container factory successfully Apr 12 19:17:38.489716 kubelet[1875]: I0412 19:17:38.489716 1875 factory.go:221] Registration of the systemd container factory successfully Apr 12 19:17:38.494537 kubelet[1875]: W0412 19:17:38.494516 1875 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 19:17:38.494537 kubelet[1875]: W0412 19:17:38.494531 1875 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.67.80.9" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 19:17:38.494627 kubelet[1875]: E0412 19:17:38.494539 1875 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.80.9\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 19:17:38.494627 kubelet[1875]: E0412 19:17:38.494550 1875 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 19:17:38.494627 kubelet[1875]: E0412 19:17:38.494550 1875 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.80.9" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 19:17:38.494627 kubelet[1875]: W0412 19:17:38.494554 1875 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 19:17:38.494627 kubelet[1875]: E0412 19:17:38.494566 1875 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 19:17:38.494738 kubelet[1875]: E0412 19:17:38.494579 1875 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.80.9.17c59e74f74b504c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.80.9,UID:10.67.80.9,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.80.9,},FirstTimestamp:2024-04-12 19:17:38.486644812 +0000 UTC m=+0.221276571,LastTimestamp:2024-04-12 19:17:38.486644812 +0000 UTC m=+0.221276571,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.80.9,}" Apr 12 19:17:38.494738 kubelet[1875]: I0412 19:17:38.494733 1875 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:17:38.494738 kubelet[1875]: I0412 19:17:38.494739 1875 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:17:38.494817 kubelet[1875]: I0412 19:17:38.494746 1875 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:17:38.495250 kubelet[1875]: E0412 19:17:38.495242 1875 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.80.9.17c59e74f76413a4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.80.9,UID:10.67.80.9,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.80.9,},FirstTimestamp:2024-04-12 19:17:38.488267684 +0000 UTC m=+0.222899450,LastTimestamp:2024-04-12 19:17:38.488267684 +0000 UTC m=+0.222899450,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.80.9,}" Apr 12 19:17:38.495585 kubelet[1875]: I0412 19:17:38.495577 1875 policy_none.go:49] "None policy: Start" Apr 12 19:17:38.495832 kubelet[1875]: I0412 19:17:38.495823 1875 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 19:17:38.495861 kubelet[1875]: I0412 19:17:38.495836 1875 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:17:38.498369 systemd[1]: Created slice kubepods.slice. Apr 12 19:17:38.500261 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 19:17:38.501352 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 19:17:38.508000 audit[1900]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.508000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd35d37610 a2=0 a3=7ffd35d375fc items=0 ppid=1875 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:17:38.509000 audit[1903]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.509000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcf5a4f640 a2=0 a3=7ffcf5a4f62c items=0 ppid=1875 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:17:38.517000 audit[1875]: AVC avc: denied { mac_admin } for pid=1875 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:38.517000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:17:38.517000 audit[1875]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab86c0 a1=c0013be4c8 a2=c000ab8690 a3=25 items=0 ppid=1 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.517000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:17:38.519215 kubelet[1875]: I0412 19:17:38.519025 1875 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:17:38.519215 kubelet[1875]: I0412 19:17:38.519062 1875 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:17:38.519333 kubelet[1875]: I0412 19:17:38.519223 1875 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:17:38.519709 kubelet[1875]: E0412 19:17:38.519701 1875 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.9\" not found" Apr 12 19:17:38.509000 audit[1905]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.509000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffbbf4b410 a2=0 a3=7fffbbf4b3fc items=0 ppid=1875 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:17:38.539000 audit[1910]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.539000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc5e2938c0 a2=0 a3=7ffc5e2938ac items=0 ppid=1875 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:17:38.575000 audit[1915]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.575000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff6e6cb390 a2=0 a3=7fff6e6cb37c items=0 ppid=1875 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 19:17:38.577256 kubelet[1875]: I0412 19:17:38.577204 1875 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 19:17:38.576000 audit[1916]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:38.576000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffae3fe560 a2=0 a3=7fffae3fe54c items=0 ppid=1875 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:17:38.576000 audit[1917]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.576000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd45b0a870 a2=0 a3=7ffd45b0a85c items=0 ppid=1875 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:17:38.577926 kubelet[1875]: I0412 19:17:38.577816 1875 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 19:17:38.577926 kubelet[1875]: I0412 19:17:38.577833 1875 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 19:17:38.577926 kubelet[1875]: I0412 19:17:38.577845 1875 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 19:17:38.577926 kubelet[1875]: E0412 19:17:38.577871 1875 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 19:17:38.576000 audit[1919]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:38.576000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe57eff810 a2=0 a3=7ffe57eff7fc items=0 ppid=1875 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:17:38.576000 audit[1918]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.576000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd1e5c0bd0 a2=0 a3=7ffd1e5c0bbc items=0 ppid=1875 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:17:38.577000 audit[1920]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:38.577000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc16ffcb40 a2=0 a3=7ffc16ffcb2c items=0 ppid=1875 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:17:38.577000 audit[1921]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:38.577000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa336f750 a2=0 a3=7fffa336f73c items=0 ppid=1875 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:17:38.577000 audit[1922]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:38.577000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffece941050 a2=0 a3=7ffece94103c items=0 ppid=1875 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:38.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:17:38.588065 kubelet[1875]: I0412 19:17:38.588055 1875 kubelet_node_status.go:73] "Attempting to register node" node="10.67.80.9" Apr 12 19:17:38.593834 kubelet[1875]: I0412 19:17:38.593825 1875 kubelet_node_status.go:76] "Successfully registered node" node="10.67.80.9" Apr 12 19:17:38.603656 kubelet[1875]: E0412 19:17:38.603611 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:38.704065 kubelet[1875]: E0412 19:17:38.703974 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:38.805378 kubelet[1875]: E0412 19:17:38.805164 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:38.905996 kubelet[1875]: E0412 19:17:38.905912 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:39.006222 kubelet[1875]: E0412 19:17:39.006121 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:39.107425 kubelet[1875]: E0412 19:17:39.107199 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:39.208418 kubelet[1875]: E0412 19:17:39.208312 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:39.309549 kubelet[1875]: E0412 19:17:39.309441 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:39.410301 kubelet[1875]: E0412 19:17:39.410080 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:39.464676 kubelet[1875]: I0412 19:17:39.464562 1875 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 19:17:39.464930 kubelet[1875]: W0412 19:17:39.464901 1875 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Apr 12 19:17:39.465047 kubelet[1875]: W0412 19:17:39.464923 1875 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Apr 12 19:17:39.485995 kubelet[1875]: E0412 19:17:39.485888 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:39.511000 kubelet[1875]: E0412 19:17:39.510942 1875 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.9\" not found" Apr 12 19:17:39.612253 kubelet[1875]: I0412 19:17:39.612236 1875 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 19:17:39.612424 env[1469]: time="2024-04-12T19:17:39.612403482Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 19:17:39.612664 kubelet[1875]: I0412 19:17:39.612513 1875 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 19:17:39.788000 audit[1623]: USER_END pid=1623 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:39.788000 audit[1623]: CRED_DISP pid=1623 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:17:39.790003 sudo[1623]: pam_unix(sudo:session): session closed for user root Apr 12 19:17:39.792846 sshd[1620]: pam_unix(sshd:session): session closed for user core Apr 12 19:17:39.793000 audit[1620]: USER_END pid=1620 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:39.794000 audit[1620]: CRED_DISP pid=1620 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 19:17:39.798510 systemd[1]: sshd@6-139.178.89.219:22-147.75.109.163:46924.service: Deactivated successfully. Apr 12 19:17:39.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.219:22-147.75.109.163:46924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:17:39.800246 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 19:17:39.801950 systemd-logind[1459]: Session 9 logged out. Waiting for processes to exit. Apr 12 19:17:39.804232 systemd-logind[1459]: Removed session 9. Apr 12 19:17:40.486704 kubelet[1875]: I0412 19:17:40.486581 1875 apiserver.go:52] "Watching apiserver" Apr 12 19:17:40.486704 kubelet[1875]: E0412 19:17:40.486671 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:40.489438 kubelet[1875]: I0412 19:17:40.489346 1875 topology_manager.go:215] "Topology Admit Handler" podUID="7bcad65b-cfdd-456b-9b5c-2a3f3beabe33" podNamespace="calico-system" podName="calico-node-649x8" Apr 12 19:17:40.489644 kubelet[1875]: I0412 19:17:40.489579 1875 topology_manager.go:215] "Topology Admit Handler" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" podNamespace="calico-system" podName="csi-node-driver-q9swx" Apr 12 19:17:40.489761 kubelet[1875]: I0412 19:17:40.489701 1875 topology_manager.go:215] "Topology Admit Handler" podUID="93a24939-3869-4a4e-a6f1-cc988112c57a" podNamespace="kube-system" podName="kube-proxy-zm8rg" Apr 12 19:17:40.490149 kubelet[1875]: E0412 19:17:40.490091 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:40.497179 systemd[1]: Created slice kubepods-besteffort-pod7bcad65b_cfdd_456b_9b5c_2a3f3beabe33.slice. Apr 12 19:17:40.513839 systemd[1]: Created slice kubepods-besteffort-pod93a24939_3869_4a4e_a6f1_cc988112c57a.slice. Apr 12 19:17:40.589359 kubelet[1875]: I0412 19:17:40.589294 1875 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 19:17:40.600081 kubelet[1875]: I0412 19:17:40.600011 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ndqrb\" (UniqueName: \"kubernetes.io/projected/a4c5c209-9142-46fb-ae3b-3a69e8c3121d-kube-api-access-ndqrb\") pod \"csi-node-driver-q9swx\" (UID: \"a4c5c209-9142-46fb-ae3b-3a69e8c3121d\") " pod="calico-system/csi-node-driver-q9swx" Apr 12 19:17:40.600412 kubelet[1875]: I0412 19:17:40.600228 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/93a24939-3869-4a4e-a6f1-cc988112c57a-kube-proxy\") pod \"kube-proxy-zm8rg\" (UID: \"93a24939-3869-4a4e-a6f1-cc988112c57a\") " pod="kube-system/kube-proxy-zm8rg" Apr 12 19:17:40.600591 kubelet[1875]: I0412 19:17:40.600406 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/93a24939-3869-4a4e-a6f1-cc988112c57a-xtables-lock\") pod \"kube-proxy-zm8rg\" (UID: \"93a24939-3869-4a4e-a6f1-cc988112c57a\") " pod="kube-system/kube-proxy-zm8rg" Apr 12 19:17:40.600591 kubelet[1875]: I0412 19:17:40.600541 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-node-certs\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.600836 kubelet[1875]: I0412 19:17:40.600613 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-var-lib-calico\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.600836 kubelet[1875]: I0412 19:17:40.600745 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-cni-bin-dir\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.601094 kubelet[1875]: I0412 19:17:40.600845 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zvb5d\" (UniqueName: \"kubernetes.io/projected/93a24939-3869-4a4e-a6f1-cc988112c57a-kube-api-access-zvb5d\") pod \"kube-proxy-zm8rg\" (UID: \"93a24939-3869-4a4e-a6f1-cc988112c57a\") " pod="kube-system/kube-proxy-zm8rg" Apr 12 19:17:40.601094 kubelet[1875]: I0412 19:17:40.600904 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-tigera-ca-bundle\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.601094 kubelet[1875]: I0412 19:17:40.600962 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a4c5c209-9142-46fb-ae3b-3a69e8c3121d-kubelet-dir\") pod \"csi-node-driver-q9swx\" (UID: \"a4c5c209-9142-46fb-ae3b-3a69e8c3121d\") " pod="calico-system/csi-node-driver-q9swx" Apr 12 19:17:40.601094 kubelet[1875]: I0412 19:17:40.601060 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-xtables-lock\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.601613 kubelet[1875]: I0412 19:17:40.601130 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-var-run-calico\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.601613 kubelet[1875]: I0412 19:17:40.601212 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-cni-log-dir\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.601613 kubelet[1875]: I0412 19:17:40.601281 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a4c5c209-9142-46fb-ae3b-3a69e8c3121d-varrun\") pod \"csi-node-driver-q9swx\" (UID: \"a4c5c209-9142-46fb-ae3b-3a69e8c3121d\") " pod="calico-system/csi-node-driver-q9swx" Apr 12 19:17:40.601613 kubelet[1875]: I0412 19:17:40.601361 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a4c5c209-9142-46fb-ae3b-3a69e8c3121d-registration-dir\") pod \"csi-node-driver-q9swx\" (UID: \"a4c5c209-9142-46fb-ae3b-3a69e8c3121d\") " pod="calico-system/csi-node-driver-q9swx" Apr 12 19:17:40.601613 kubelet[1875]: I0412 19:17:40.601425 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w9g4p\" (UniqueName: \"kubernetes.io/projected/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-kube-api-access-w9g4p\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.602168 kubelet[1875]: I0412 19:17:40.601516 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a4c5c209-9142-46fb-ae3b-3a69e8c3121d-socket-dir\") pod \"csi-node-driver-q9swx\" (UID: \"a4c5c209-9142-46fb-ae3b-3a69e8c3121d\") " pod="calico-system/csi-node-driver-q9swx" Apr 12 19:17:40.602168 kubelet[1875]: I0412 19:17:40.601579 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/93a24939-3869-4a4e-a6f1-cc988112c57a-lib-modules\") pod \"kube-proxy-zm8rg\" (UID: \"93a24939-3869-4a4e-a6f1-cc988112c57a\") " pod="kube-system/kube-proxy-zm8rg" Apr 12 19:17:40.602168 kubelet[1875]: I0412 19:17:40.601673 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-lib-modules\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.602168 kubelet[1875]: I0412 19:17:40.601740 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-policysync\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.602168 kubelet[1875]: I0412 19:17:40.601800 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-cni-net-dir\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.602670 kubelet[1875]: I0412 19:17:40.601860 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7bcad65b-cfdd-456b-9b5c-2a3f3beabe33-flexvol-driver-host\") pod \"calico-node-649x8\" (UID: \"7bcad65b-cfdd-456b-9b5c-2a3f3beabe33\") " pod="calico-system/calico-node-649x8" Apr 12 19:17:40.704691 kubelet[1875]: E0412 19:17:40.704608 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.704691 kubelet[1875]: W0412 19:17:40.704661 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.705141 kubelet[1875]: E0412 19:17:40.704731 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.705421 kubelet[1875]: E0412 19:17:40.705365 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.705421 kubelet[1875]: W0412 19:17:40.705400 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.705724 kubelet[1875]: E0412 19:17:40.705456 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.706102 kubelet[1875]: E0412 19:17:40.706018 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.706102 kubelet[1875]: W0412 19:17:40.706054 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.706102 kubelet[1875]: E0412 19:17:40.706103 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.706624 kubelet[1875]: E0412 19:17:40.706595 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.706784 kubelet[1875]: W0412 19:17:40.706623 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.706784 kubelet[1875]: E0412 19:17:40.706748 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.707143 kubelet[1875]: E0412 19:17:40.707070 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.707143 kubelet[1875]: W0412 19:17:40.707092 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.707476 kubelet[1875]: E0412 19:17:40.707203 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.707622 kubelet[1875]: E0412 19:17:40.707529 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.707622 kubelet[1875]: W0412 19:17:40.707550 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.707834 kubelet[1875]: E0412 19:17:40.707667 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.708105 kubelet[1875]: E0412 19:17:40.708026 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.708105 kubelet[1875]: W0412 19:17:40.708061 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.708105 kubelet[1875]: E0412 19:17:40.708101 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.708800 kubelet[1875]: E0412 19:17:40.708722 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.708800 kubelet[1875]: W0412 19:17:40.708756 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.708800 kubelet[1875]: E0412 19:17:40.708796 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.710051 kubelet[1875]: E0412 19:17:40.710012 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.710051 kubelet[1875]: W0412 19:17:40.710019 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.710051 kubelet[1875]: E0412 19:17:40.710026 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.716896 kubelet[1875]: E0412 19:17:40.716858 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.716896 kubelet[1875]: W0412 19:17:40.716864 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.716896 kubelet[1875]: E0412 19:17:40.716874 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.718223 kubelet[1875]: E0412 19:17:40.718185 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.718223 kubelet[1875]: W0412 19:17:40.718191 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.718223 kubelet[1875]: E0412 19:17:40.718198 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.720372 kubelet[1875]: E0412 19:17:40.720337 1875 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:17:40.720372 kubelet[1875]: W0412 19:17:40.720343 1875 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:17:40.720372 kubelet[1875]: E0412 19:17:40.720350 1875 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:17:40.815647 env[1469]: time="2024-04-12T19:17:40.815399877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-649x8,Uid:7bcad65b-cfdd-456b-9b5c-2a3f3beabe33,Namespace:calico-system,Attempt:0,}" Apr 12 19:17:40.816577 env[1469]: time="2024-04-12T19:17:40.816133569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zm8rg,Uid:93a24939-3869-4a4e-a6f1-cc988112c57a,Namespace:kube-system,Attempt:0,}" Apr 12 19:17:41.442901 env[1469]: time="2024-04-12T19:17:41.442839266Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.443646 env[1469]: time="2024-04-12T19:17:41.443596491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.444155 env[1469]: time="2024-04-12T19:17:41.444119512Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.444918 env[1469]: time="2024-04-12T19:17:41.444879683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.446511 env[1469]: time="2024-04-12T19:17:41.446472236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.447883 env[1469]: time="2024-04-12T19:17:41.447860701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.448207 env[1469]: time="2024-04-12T19:17:41.448178932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.448599 env[1469]: time="2024-04-12T19:17:41.448586097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:41.454458 env[1469]: time="2024-04-12T19:17:41.454428859Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:17:41.454458 env[1469]: time="2024-04-12T19:17:41.454450561Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:17:41.454458 env[1469]: time="2024-04-12T19:17:41.454458113Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:17:41.454566 env[1469]: time="2024-04-12T19:17:41.454547142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/764f3be27b36bc46fe6361f7c750d7c77dc801b5d02ae8123c5baa2ac2da2e49 pid=1955 runtime=io.containerd.runc.v2 Apr 12 19:17:41.454862 env[1469]: time="2024-04-12T19:17:41.454844377Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:17:41.454890 env[1469]: time="2024-04-12T19:17:41.454858938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:17:41.454890 env[1469]: time="2024-04-12T19:17:41.454865070Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:17:41.454934 env[1469]: time="2024-04-12T19:17:41.454922001Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36 pid=1958 runtime=io.containerd.runc.v2 Apr 12 19:17:41.460528 systemd[1]: Started cri-containerd-764f3be27b36bc46fe6361f7c750d7c77dc801b5d02ae8123c5baa2ac2da2e49.scope. Apr 12 19:17:41.461201 systemd[1]: Started cri-containerd-7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36.scope. Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit: BPF prog-id=64 op=LOAD Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736393530333332363733323139383336333566303264623430646539 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736393530333332363733323139383336333566303264623430646539 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit: BPF prog-id=65 op=LOAD Apr 12 19:17:41.464000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c7dc0 items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736393530333332363733323139383336333566303264623430646539 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit: BPF prog-id=66 op=LOAD Apr 12 19:17:41.464000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002c7e08 items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736393530333332363733323139383336333566303264623430646539 Apr 12 19:17:41.464000 audit: BPF prog-id=66 op=UNLOAD Apr 12 19:17:41.464000 audit: BPF prog-id=65 op=UNLOAD Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit: BPF prog-id=67 op=LOAD Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.464000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000394218 items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736393530333332363733323139383336333566303264623430646539 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit: BPF prog-id=68 op=LOAD Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1955 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346633626532376233366263343666653633363166376337353064 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=1955 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346633626532376233366263343666653633363166376337353064 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit: BPF prog-id=69 op=LOAD Apr 12 19:17:41.465000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000252b70 items=0 ppid=1955 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346633626532376233366263343666653633363166376337353064 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit: BPF prog-id=70 op=LOAD Apr 12 19:17:41.465000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000252bb8 items=0 ppid=1955 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346633626532376233366263343666653633363166376337353064 Apr 12 19:17:41.465000 audit: BPF prog-id=70 op=UNLOAD Apr 12 19:17:41.465000 audit: BPF prog-id=69 op=UNLOAD Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:41.465000 audit: BPF prog-id=71 op=LOAD Apr 12 19:17:41.465000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000252fc8 items=0 ppid=1955 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:41.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346633626532376233366263343666653633363166376337353064 Apr 12 19:17:41.470963 env[1469]: time="2024-04-12T19:17:41.470940436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-649x8,Uid:7bcad65b-cfdd-456b-9b5c-2a3f3beabe33,Namespace:calico-system,Attempt:0,} returns sandbox id \"7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36\"" Apr 12 19:17:41.471474 env[1469]: time="2024-04-12T19:17:41.471457495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zm8rg,Uid:93a24939-3869-4a4e-a6f1-cc988112c57a,Namespace:kube-system,Attempt:0,} returns sandbox id \"764f3be27b36bc46fe6361f7c750d7c77dc801b5d02ae8123c5baa2ac2da2e49\"" Apr 12 19:17:41.471893 env[1469]: time="2024-04-12T19:17:41.471882569Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 19:17:41.487815 kubelet[1875]: E0412 19:17:41.487777 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:41.722415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3043194263.mount: Deactivated successfully. Apr 12 19:17:42.488749 kubelet[1875]: E0412 19:17:42.488633 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:42.578829 kubelet[1875]: E0412 19:17:42.578718 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:42.804711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2652937149.mount: Deactivated successfully. Apr 12 19:17:43.489496 kubelet[1875]: E0412 19:17:43.489463 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:43.975325 env[1469]: time="2024-04-12T19:17:43.975220186Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:43.976071 env[1469]: time="2024-04-12T19:17:43.976023866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:43.977175 env[1469]: time="2024-04-12T19:17:43.977127420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:43.978604 env[1469]: time="2024-04-12T19:17:43.978564877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:43.979201 env[1469]: time="2024-04-12T19:17:43.979158030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 19:17:43.979619 env[1469]: time="2024-04-12T19:17:43.979583324Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 19:17:43.980897 env[1469]: time="2024-04-12T19:17:43.980880246Z" level=info msg="CreateContainer within sandbox \"7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 19:17:43.985734 env[1469]: time="2024-04-12T19:17:43.985692216Z" level=info msg="CreateContainer within sandbox \"7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4\"" Apr 12 19:17:43.986113 env[1469]: time="2024-04-12T19:17:43.986100202Z" level=info msg="StartContainer for \"1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4\"" Apr 12 19:17:43.995923 systemd[1]: Started cri-containerd-1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4.scope. Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.008194 kernel: kauditd_printk_skb: 528 callbacks suppressed Apr 12 19:17:44.008258 kernel: audit: type=1400 audit(1712949464.002:587): avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc0f06092c8 items=0 ppid=1958 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:44.078793 kernel: audit: type=1300 audit(1712949464.002:587): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc0f06092c8 items=0 ppid=1958 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:44.078819 kernel: audit: type=1327 audit(1712949464.002:587): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353735393031356434636332356434363262323434326661326265 Apr 12 19:17:44.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353735393031356434636332356434363262323434326661326265 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.213836 kernel: audit: type=1400 audit(1712949464.002:588): avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.213866 kernel: audit: type=1400 audit(1712949464.002:588): avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.270380 kernel: audit: type=1400 audit(1712949464.002:588): avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.329494 kernel: audit: type=1400 audit(1712949464.002:588): avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.389530 kernel: audit: type=1400 audit(1712949464.002:588): avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.394416 env[1469]: time="2024-04-12T19:17:44.394394686Z" level=info msg="StartContainer for \"1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4\" returns successfully" Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.450622 systemd[1]: cri-containerd-1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4.scope: Deactivated successfully. Apr 12 19:17:44.489698 kubelet[1875]: E0412 19:17:44.489679 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:44.512546 kernel: audit: type=1400 audit(1712949464.002:588): avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.512576 kernel: audit: type=1400 audit(1712949464.002:588): avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.002000 audit: BPF prog-id=72 op=LOAD Apr 12 19:17:44.002000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=1958 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:44.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353735393031356434636332356434363262323434326661326265 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.028000 audit: BPF prog-id=73 op=LOAD Apr 12 19:17:44.028000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=1958 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:44.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353735393031356434636332356434363262323434326661326265 Apr 12 19:17:44.156000 audit: BPF prog-id=73 op=UNLOAD Apr 12 19:17:44.156000 audit: BPF prog-id=72 op=UNLOAD Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:44.156000 audit: BPF prog-id=74 op=LOAD Apr 12 19:17:44.156000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=1958 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:44.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353735393031356434636332356434363262323434326661326265 Apr 12 19:17:44.578732 kubelet[1875]: E0412 19:17:44.578718 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:44.580000 audit: BPF prog-id=74 op=UNLOAD Apr 12 19:17:44.599874 env[1469]: time="2024-04-12T19:17:44.599845165Z" level=info msg="shim disconnected" id=1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4 Apr 12 19:17:44.599874 env[1469]: time="2024-04-12T19:17:44.599870612Z" level=warning msg="cleaning up after shim disconnected" id=1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4 namespace=k8s.io Apr 12 19:17:44.599874 env[1469]: time="2024-04-12T19:17:44.599876648Z" level=info msg="cleaning up dead shim" Apr 12 19:17:44.603429 env[1469]: time="2024-04-12T19:17:44.603383932Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:17:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2069 runtime=io.containerd.runc.v2\n" Apr 12 19:17:44.985104 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1d5759015d4cc25d462b2442fa2bea665d4740fe54e1198f01f1a927c4753cb4-rootfs.mount: Deactivated successfully. Apr 12 19:17:45.288830 env[1469]: time="2024-04-12T19:17:45.288734957Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:45.289368 env[1469]: time="2024-04-12T19:17:45.289322115Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:45.290076 env[1469]: time="2024-04-12T19:17:45.290040003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:45.290763 env[1469]: time="2024-04-12T19:17:45.290707591Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:45.291130 env[1469]: time="2024-04-12T19:17:45.291088639Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392\"" Apr 12 19:17:45.292167 env[1469]: time="2024-04-12T19:17:45.292122741Z" level=info msg="CreateContainer within sandbox \"764f3be27b36bc46fe6361f7c750d7c77dc801b5d02ae8123c5baa2ac2da2e49\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 19:17:45.298211 env[1469]: time="2024-04-12T19:17:45.298163121Z" level=info msg="CreateContainer within sandbox \"764f3be27b36bc46fe6361f7c750d7c77dc801b5d02ae8123c5baa2ac2da2e49\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"64ace2899e54af4acb627a3c331ab34805a595f43c6aa3c27ce7649b2f8202db\"" Apr 12 19:17:45.298424 env[1469]: time="2024-04-12T19:17:45.298411896Z" level=info msg="StartContainer for \"64ace2899e54af4acb627a3c331ab34805a595f43c6aa3c27ce7649b2f8202db\"" Apr 12 19:17:45.308096 systemd[1]: Started cri-containerd-64ace2899e54af4acb627a3c331ab34805a595f43c6aa3c27ce7649b2f8202db.scope. Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7ff9d60cc858 items=0 ppid=1955 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616365323839396535346166346163623632376133633333316162 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit: BPF prog-id=75 op=LOAD Apr 12 19:17:45.313000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003c00e8 items=0 ppid=1955 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616365323839396535346166346163623632376133633333316162 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit: BPF prog-id=76 op=LOAD Apr 12 19:17:45.313000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003c0138 items=0 ppid=1955 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616365323839396535346166346163623632376133633333316162 Apr 12 19:17:45.313000 audit: BPF prog-id=76 op=UNLOAD Apr 12 19:17:45.313000 audit: BPF prog-id=75 op=UNLOAD Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:45.313000 audit: BPF prog-id=77 op=LOAD Apr 12 19:17:45.313000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003c01c8 items=0 ppid=1955 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616365323839396535346166346163623632376133633333316162 Apr 12 19:17:45.320494 env[1469]: time="2024-04-12T19:17:45.320465948Z" level=info msg="StartContainer for \"64ace2899e54af4acb627a3c331ab34805a595f43c6aa3c27ce7649b2f8202db\" returns successfully" Apr 12 19:17:45.452000 audit[2158]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.452000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff054fdf20 a2=0 a3=7fff054fdf0c items=0 ppid=2104 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:17:45.452000 audit[2159]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.452000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca917d0d0 a2=0 a3=7ffca917d0bc items=0 ppid=2104 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:17:45.455000 audit[2160]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.455000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd15bf7800 a2=0 a3=7ffd15bf77ec items=0 ppid=2104 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:17:45.456000 audit[2161]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.456000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5ba9df80 a2=0 a3=7ffc5ba9df6c items=0 ppid=2104 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:17:45.458000 audit[2162]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.458000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd81580f70 a2=0 a3=7ffd81580f5c items=0 ppid=2104 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:17:45.459000 audit[2163]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.459000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff163eb890 a2=0 a3=7fff163eb87c items=0 ppid=2104 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:17:45.490877 kubelet[1875]: E0412 19:17:45.490771 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:45.555000 audit[2164]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.555000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe761e3cb0 a2=0 a3=7ffe761e3c9c items=0 ppid=2104 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:17:45.562000 audit[2166]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.562000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd658c5d20 a2=0 a3=7ffd658c5d0c items=0 ppid=2104 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 19:17:45.570000 audit[2169]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.570000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1a808ee0 a2=0 a3=7ffd1a808ecc items=0 ppid=2104 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 19:17:45.573000 audit[2170]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.573000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffca4e2680 a2=0 a3=7fffca4e266c items=0 ppid=2104 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:17:45.579000 audit[2172]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.579000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff381ba870 a2=0 a3=7fff381ba85c items=0 ppid=2104 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:17:45.581000 audit[2173]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.581000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdffab1400 a2=0 a3=7ffdffab13ec items=0 ppid=2104 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:17:45.588000 audit[2175]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.588000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd32f2ba90 a2=0 a3=7ffd32f2ba7c items=0 ppid=2104 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:17:45.598000 audit[2178]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.598000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff466f0010 a2=0 a3=7fff466efffc items=0 ppid=2104 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 19:17:45.601000 audit[2179]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.601000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7c120b40 a2=0 a3=7ffd7c120b2c items=0 ppid=2104 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:17:45.603977 env[1469]: time="2024-04-12T19:17:45.603915672Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 19:17:45.606959 kubelet[1875]: I0412 19:17:45.606907 1875 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-zm8rg" podStartSLOduration=3.787384344 podStartE2EDuration="7.606782127s" podCreationTimestamp="2024-04-12 19:17:38 +0000 UTC" firstStartedPulling="2024-04-12 19:17:41.471843727 +0000 UTC m=+3.206475483" lastFinishedPulling="2024-04-12 19:17:45.291241507 +0000 UTC m=+7.025873266" observedRunningTime="2024-04-12 19:17:45.606283354 +0000 UTC m=+7.340915170" watchObservedRunningTime="2024-04-12 19:17:45.606782127 +0000 UTC m=+7.341413954" Apr 12 19:17:45.607000 audit[2181]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.607000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0b510280 a2=0 a3=7fff0b51026c items=0 ppid=2104 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:17:45.610000 audit[2182]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.610000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd080ed4c0 a2=0 a3=7ffd080ed4ac items=0 ppid=2104 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:17:45.617000 audit[2184]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.617000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffebe617520 a2=0 a3=7ffebe61750c items=0 ppid=2104 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:17:45.625000 audit[2187]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.625000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd607772e0 a2=0 a3=7ffd607772cc items=0 ppid=2104 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:17:45.633000 audit[2190]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.633000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff1cbcb80 a2=0 a3=7ffff1cbcb6c items=0 ppid=2104 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:17:45.636000 audit[2191]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.636000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff7e069910 a2=0 a3=7fff7e0698fc items=0 ppid=2104 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:17:45.642000 audit[2193]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.642000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffef58bece0 a2=0 a3=7ffef58beccc items=0 ppid=2104 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:17:45.694000 audit[2198]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.694000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcf6ab2dc0 a2=0 a3=7ffcf6ab2dac items=0 ppid=2104 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:17:45.695000 audit[2199]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.695000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc9ccf0d0 a2=0 a3=7fffc9ccf0bc items=0 ppid=2104 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:17:45.697000 audit[2201]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:17:45.697000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe38c0cbc0 a2=0 a3=7ffe38c0cbac items=0 ppid=2104 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:17:45.707000 audit[2207]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:17:45.707000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe092b19d0 a2=0 a3=7ffe092b19bc items=0 ppid=2104 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:17:45.727000 audit[2207]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:17:45.727000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe092b19d0 a2=0 a3=7ffe092b19bc items=0 ppid=2104 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.727000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:17:45.739000 audit[2215]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.739000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcfbc0c1c0 a2=0 a3=7ffcfbc0c1ac items=0 ppid=2104 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:17:45.741000 audit[2217]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.741000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc0fe969b0 a2=0 a3=7ffc0fe9699c items=0 ppid=2104 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 19:17:45.745000 audit[2220]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.745000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd30608990 a2=0 a3=7ffd3060897c items=0 ppid=2104 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 19:17:45.746000 audit[2221]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.746000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1a7efbf0 a2=0 a3=7fff1a7efbdc items=0 ppid=2104 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:17:45.748000 audit[2223]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.748000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc06953680 a2=0 a3=7ffc0695366c items=0 ppid=2104 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:17:45.749000 audit[2224]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.749000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfe787a00 a2=0 a3=7ffcfe7879ec items=0 ppid=2104 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:17:45.751000 audit[2226]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.751000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc13fc9140 a2=0 a3=7ffc13fc912c items=0 ppid=2104 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 19:17:45.753000 audit[2229]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.753000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffca6c48c30 a2=0 a3=7ffca6c48c1c items=0 ppid=2104 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:17:45.754000 audit[2230]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.754000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4e0b7a10 a2=0 a3=7ffd4e0b79fc items=0 ppid=2104 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:17:45.756000 audit[2232]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.756000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9612ed70 a2=0 a3=7ffc9612ed5c items=0 ppid=2104 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:17:45.757000 audit[2233]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.757000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4ec5ad60 a2=0 a3=7ffe4ec5ad4c items=0 ppid=2104 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:17:45.759000 audit[2235]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.759000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6fd40bc0 a2=0 a3=7ffe6fd40bac items=0 ppid=2104 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:17:45.762000 audit[2238]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.762000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe614b8140 a2=0 a3=7ffe614b812c items=0 ppid=2104 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:17:45.764000 audit[2241]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.764000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4bba2590 a2=0 a3=7ffc4bba257c items=0 ppid=2104 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 19:17:45.765000 audit[2242]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.765000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb5d20930 a2=0 a3=7ffeb5d2091c items=0 ppid=2104 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:17:45.767000 audit[2244]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.767000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc0b57ebd0 a2=0 a3=7ffc0b57ebbc items=0 ppid=2104 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:17:45.769000 audit[2247]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.769000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc2987c180 a2=0 a3=7ffc2987c16c items=0 ppid=2104 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:17:45.770000 audit[2248]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.770000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffee60770 a2=0 a3=7ffffee6075c items=0 ppid=2104 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:17:45.772000 audit[2250]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.772000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdc39a6e30 a2=0 a3=7ffdc39a6e1c items=0 ppid=2104 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:17:45.773000 audit[2251]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.773000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb20e6c60 a2=0 a3=7ffdb20e6c4c items=0 ppid=2104 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:17:45.775000 audit[2253]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.775000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff26a5f010 a2=0 a3=7fff26a5effc items=0 ppid=2104 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:17:45.777000 audit[2256]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:17:45.777000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1c9ba500 a2=0 a3=7ffd1c9ba4ec items=0 ppid=2104 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:17:45.779000 audit[2258]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:17:45.779000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff4e9b3f40 a2=0 a3=7fff4e9b3f2c items=0 ppid=2104 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.779000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:17:45.780000 audit[2258]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:17:45.780000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff4e9b3f40 a2=0 a3=7fff4e9b3f2c items=0 ppid=2104 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:45.780000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:17:46.491534 kubelet[1875]: E0412 19:17:46.491397 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:46.579109 kubelet[1875]: E0412 19:17:46.579016 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:47.014371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1094041866.mount: Deactivated successfully. Apr 12 19:17:47.492785 kubelet[1875]: E0412 19:17:47.492569 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:48.493241 kubelet[1875]: E0412 19:17:48.493148 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:48.578326 kubelet[1875]: E0412 19:17:48.578273 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:49.493901 kubelet[1875]: E0412 19:17:49.493855 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:50.494999 kubelet[1875]: E0412 19:17:50.494934 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:50.500116 env[1469]: time="2024-04-12T19:17:50.500075199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:50.500723 env[1469]: time="2024-04-12T19:17:50.500678431Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:50.501758 env[1469]: time="2024-04-12T19:17:50.501712942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:50.502817 env[1469]: time="2024-04-12T19:17:50.502769749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:50.503275 env[1469]: time="2024-04-12T19:17:50.503232064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 19:17:50.504243 env[1469]: time="2024-04-12T19:17:50.504201475Z" level=info msg="CreateContainer within sandbox \"7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 19:17:50.509123 env[1469]: time="2024-04-12T19:17:50.509081560Z" level=info msg="CreateContainer within sandbox \"7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098\"" Apr 12 19:17:50.509300 env[1469]: time="2024-04-12T19:17:50.509257514Z" level=info msg="StartContainer for \"06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098\"" Apr 12 19:17:50.518775 systemd[1]: Started cri-containerd-06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098.scope. Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.552734 kernel: kauditd_printk_skb: 230 callbacks suppressed Apr 12 19:17:50.552828 kernel: audit: type=1400 audit(1712949470.524:651): avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.578608 kubelet[1875]: E0412 19:17:50.578538 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:50.524000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2594731d38 items=0 ppid=1958 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:50.712858 kernel: audit: type=1300 audit(1712949470.524:651): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2594731d38 items=0 ppid=1958 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:50.712894 kernel: audit: type=1327 audit(1712949470.524:651): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613437343164363836643835386431313638656361306333666637 Apr 12 19:17:50.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613437343164363836643835386431313638656361306333666637 Apr 12 19:17:50.805543 kernel: audit: type=1400 audit(1712949470.524:652): avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.868379 kernel: audit: type=1400 audit(1712949470.524:652): avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.931470 kernel: audit: type=1400 audit(1712949470.524:652): avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.994328 kernel: audit: type=1400 audit(1712949470.524:652): avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:51.057636 kernel: audit: type=1400 audit(1712949470.524:652): avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:51.120960 kernel: audit: type=1400 audit(1712949470.524:652): avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:51.126382 env[1469]: time="2024-04-12T19:17:51.126353614Z" level=info msg="StartContainer for \"06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098\" returns successfully" Apr 12 19:17:51.184232 kernel: audit: type=1400 audit(1712949470.524:652): avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.524000 audit: BPF prog-id=78 op=LOAD Apr 12 19:17:50.524000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003821b8 items=0 ppid=1958 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:50.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613437343164363836643835386431313638656361306333666637 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.616000 audit: BPF prog-id=79 op=LOAD Apr 12 19:17:50.616000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000382208 items=0 ppid=1958 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:50.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613437343164363836643835386431313638656361306333666637 Apr 12 19:17:50.866000 audit: BPF prog-id=79 op=UNLOAD Apr 12 19:17:50.866000 audit: BPF prog-id=78 op=UNLOAD Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:50.866000 audit: BPF prog-id=80 op=LOAD Apr 12 19:17:50.866000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000382298 items=0 ppid=1958 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:50.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613437343164363836643835386431313638656361306333666637 Apr 12 19:17:51.495956 kubelet[1875]: E0412 19:17:51.495750 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:51.662507 systemd[1]: cri-containerd-06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098.scope: Deactivated successfully. Apr 12 19:17:51.671092 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098-rootfs.mount: Deactivated successfully. Apr 12 19:17:51.672000 audit: BPF prog-id=80 op=UNLOAD Apr 12 19:17:51.682196 kubelet[1875]: I0412 19:17:51.682147 1875 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 19:17:52.379425 env[1469]: time="2024-04-12T19:17:52.379296713Z" level=info msg="shim disconnected" id=06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098 Apr 12 19:17:52.379425 env[1469]: time="2024-04-12T19:17:52.379415521Z" level=warning msg="cleaning up after shim disconnected" id=06a4741d686d858d1168eca0c3ff71b6265269721ebe3e2c1747da629141f098 namespace=k8s.io Apr 12 19:17:52.380818 env[1469]: time="2024-04-12T19:17:52.379448653Z" level=info msg="cleaning up dead shim" Apr 12 19:17:52.395836 env[1469]: time="2024-04-12T19:17:52.395719316Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:17:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2316 runtime=io.containerd.runc.v2\n" Apr 12 19:17:52.496680 kubelet[1875]: E0412 19:17:52.496543 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:52.591685 systemd[1]: Created slice kubepods-besteffort-poda4c5c209_9142_46fb_ae3b_3a69e8c3121d.slice. Apr 12 19:17:52.596909 env[1469]: time="2024-04-12T19:17:52.596777549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q9swx,Uid:a4c5c209-9142-46fb-ae3b-3a69e8c3121d,Namespace:calico-system,Attempt:0,}" Apr 12 19:17:52.620195 env[1469]: time="2024-04-12T19:17:52.620145386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 19:17:52.635646 env[1469]: time="2024-04-12T19:17:52.635531409Z" level=error msg="Failed to destroy network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:52.635826 env[1469]: time="2024-04-12T19:17:52.635776941Z" level=error msg="encountered an error cleaning up failed sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:52.635868 env[1469]: time="2024-04-12T19:17:52.635815668Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q9swx,Uid:a4c5c209-9142-46fb-ae3b-3a69e8c3121d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:52.636034 kubelet[1875]: E0412 19:17:52.635988 1875 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:52.636034 kubelet[1875]: E0412 19:17:52.636026 1875 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-q9swx" Apr 12 19:17:52.636100 kubelet[1875]: E0412 19:17:52.636051 1875 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-q9swx" Apr 12 19:17:52.636125 kubelet[1875]: E0412 19:17:52.636116 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-q9swx_calico-system(a4c5c209-9142-46fb-ae3b-3a69e8c3121d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-q9swx_calico-system(a4c5c209-9142-46fb-ae3b-3a69e8c3121d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:52.636464 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3-shm.mount: Deactivated successfully. Apr 12 19:17:53.497320 kubelet[1875]: E0412 19:17:53.497211 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:53.624577 kubelet[1875]: I0412 19:17:53.624500 1875 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:17:53.625849 env[1469]: time="2024-04-12T19:17:53.625765671Z" level=info msg="StopPodSandbox for \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\"" Apr 12 19:17:53.657614 env[1469]: time="2024-04-12T19:17:53.657554319Z" level=error msg="StopPodSandbox for \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\" failed" error="failed to destroy network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:53.657789 kubelet[1875]: E0412 19:17:53.657777 1875 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:17:53.657851 kubelet[1875]: E0412 19:17:53.657843 1875 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3"} Apr 12 19:17:53.657875 kubelet[1875]: E0412 19:17:53.657866 1875 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a4c5c209-9142-46fb-ae3b-3a69e8c3121d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:17:53.657920 kubelet[1875]: E0412 19:17:53.657884 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a4c5c209-9142-46fb-ae3b-3a69e8c3121d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-q9swx" podUID="a4c5c209-9142-46fb-ae3b-3a69e8c3121d" Apr 12 19:17:54.498002 kubelet[1875]: E0412 19:17:54.497940 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:55.498600 kubelet[1875]: E0412 19:17:55.498519 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:56.316537 kubelet[1875]: I0412 19:17:56.316517 1875 topology_manager.go:215] "Topology Admit Handler" podUID="7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a" podNamespace="default" podName="nginx-deployment-6d5f899847-q2j2x" Apr 12 19:17:56.320203 systemd[1]: Created slice kubepods-besteffort-pod7b4a1dc2_6d61_48d4_a9aa_08e1005ddb7a.slice. Apr 12 19:17:56.410593 kubelet[1875]: I0412 19:17:56.410546 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dbw2d\" (UniqueName: \"kubernetes.io/projected/7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a-kube-api-access-dbw2d\") pod \"nginx-deployment-6d5f899847-q2j2x\" (UID: \"7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a\") " pod="default/nginx-deployment-6d5f899847-q2j2x" Apr 12 19:17:56.499263 kubelet[1875]: E0412 19:17:56.499231 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:56.622117 env[1469]: time="2024-04-12T19:17:56.622034358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-q2j2x,Uid:7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a,Namespace:default,Attempt:0,}" Apr 12 19:17:56.652731 env[1469]: time="2024-04-12T19:17:56.652661100Z" level=error msg="Failed to destroy network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:56.652904 env[1469]: time="2024-04-12T19:17:56.652855263Z" level=error msg="encountered an error cleaning up failed sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:56.652904 env[1469]: time="2024-04-12T19:17:56.652883320Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-q2j2x,Uid:7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:56.653079 kubelet[1875]: E0412 19:17:56.653065 1875 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:56.653115 kubelet[1875]: E0412 19:17:56.653108 1875 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-q2j2x" Apr 12 19:17:56.653142 kubelet[1875]: E0412 19:17:56.653130 1875 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-q2j2x" Apr 12 19:17:56.653186 kubelet[1875]: E0412 19:17:56.653173 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-q2j2x_default(7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-q2j2x_default(7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-q2j2x" podUID="7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a" Apr 12 19:17:56.653755 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647-shm.mount: Deactivated successfully. Apr 12 19:17:57.500384 kubelet[1875]: E0412 19:17:57.500341 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:57.637213 kubelet[1875]: I0412 19:17:57.637197 1875 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:17:57.637555 env[1469]: time="2024-04-12T19:17:57.637532060Z" level=info msg="StopPodSandbox for \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\"" Apr 12 19:17:57.651193 env[1469]: time="2024-04-12T19:17:57.651125996Z" level=error msg="StopPodSandbox for \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\" failed" error="failed to destroy network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:17:57.651315 kubelet[1875]: E0412 19:17:57.651304 1875 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:17:57.651348 kubelet[1875]: E0412 19:17:57.651333 1875 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647"} Apr 12 19:17:57.651370 kubelet[1875]: E0412 19:17:57.651358 1875 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:17:57.651415 kubelet[1875]: E0412 19:17:57.651374 1875 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-q2j2x" podUID="7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a" Apr 12 19:17:58.149259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3687733180.mount: Deactivated successfully. Apr 12 19:17:58.171987 env[1469]: time="2024-04-12T19:17:58.171946591Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:58.172517 env[1469]: time="2024-04-12T19:17:58.172504569Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:58.173081 env[1469]: time="2024-04-12T19:17:58.173066851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:58.173686 env[1469]: time="2024-04-12T19:17:58.173647369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:17:58.173981 env[1469]: time="2024-04-12T19:17:58.173934022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 19:17:58.177866 env[1469]: time="2024-04-12T19:17:58.177846474Z" level=info msg="CreateContainer within sandbox \"7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 19:17:58.183005 env[1469]: time="2024-04-12T19:17:58.182988567Z" level=info msg="CreateContainer within sandbox \"7695033267321983635f02db40de9c75955dd8226d1b55cba3ebc92d8eaf3b36\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"dcb42d920b5acbca4d145a13731409fd1e311c70df83cf35aa8216d2a0cb6ca1\"" Apr 12 19:17:58.183364 env[1469]: time="2024-04-12T19:17:58.183318051Z" level=info msg="StartContainer for \"dcb42d920b5acbca4d145a13731409fd1e311c70df83cf35aa8216d2a0cb6ca1\"" Apr 12 19:17:58.192295 systemd[1]: Started cri-containerd-dcb42d920b5acbca4d145a13731409fd1e311c70df83cf35aa8216d2a0cb6ca1.scope. Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.229052 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 19:17:58.229127 kernel: audit: type=1400 audit(1712949478.201:658): avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f328ddb2aa8 items=0 ppid=1958 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:58.390677 kernel: audit: type=1300 audit(1712949478.201:658): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f328ddb2aa8 items=0 ppid=1958 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:58.390709 kernel: audit: type=1327 audit(1712949478.201:658): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623432643932306235616362636134643134356131333733313430 Apr 12 19:17:58.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623432643932306235616362636134643134356131333733313430 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.486083 kubelet[1875]: E0412 19:17:58.486068 1875 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:58.501220 kubelet[1875]: E0412 19:17:58.501205 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:17:58.547286 kernel: audit: type=1400 audit(1712949478.201:659): avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.610796 kernel: audit: type=1400 audit(1712949478.201:659): avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.610821 kernel: audit: type=1400 audit(1712949478.201:659): avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.738546 kernel: audit: type=1400 audit(1712949478.201:659): avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.738605 kernel: audit: type=1400 audit(1712949478.201:659): avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.802562 kernel: audit: type=1400 audit(1712949478.201:659): avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.815321 env[1469]: time="2024-04-12T19:17:58.815265329Z" level=info msg="StartContainer for \"dcb42d920b5acbca4d145a13731409fd1e311c70df83cf35aa8216d2a0cb6ca1\" returns successfully" Apr 12 19:17:58.867816 kernel: audit: type=1400 audit(1712949478.201:659): avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.201000 audit: BPF prog-id=81 op=LOAD Apr 12 19:17:58.201000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000ddba8 items=0 ppid=1958 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:58.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623432643932306235616362636134643134356131333733313430 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.389000 audit: BPF prog-id=82 op=LOAD Apr 12 19:17:58.389000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000ddbf8 items=0 ppid=1958 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:58.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623432643932306235616362636134643134356131333733313430 Apr 12 19:17:58.546000 audit: BPF prog-id=82 op=UNLOAD Apr 12 19:17:58.546000 audit: BPF prog-id=81 op=UNLOAD Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:17:58.546000 audit: BPF prog-id=83 op=LOAD Apr 12 19:17:58.546000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000ddc88 items=0 ppid=1958 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:17:58.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463623432643932306235616362636134643134356131333733313430 Apr 12 19:17:59.015194 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 19:17:59.015235 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 19:17:59.501840 kubelet[1875]: E0412 19:17:59.501733 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:00.359000 audit[2631]: AVC avc: denied { write } for pid=2631 comm="tee" name="fd" dev="proc" ino=20379 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:18:00.359000 audit[2630]: AVC avc: denied { write } for pid=2630 comm="tee" name="fd" dev="proc" ino=32867 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:18:00.359000 audit[2628]: AVC avc: denied { write } for pid=2628 comm="tee" name="fd" dev="proc" ino=18346 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:18:00.359000 audit[2627]: AVC avc: denied { write } for pid=2627 comm="tee" name="fd" dev="proc" ino=27233 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:18:00.359000 audit[2637]: AVC avc: denied { write } for pid=2637 comm="tee" name="fd" dev="proc" ino=29883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:18:00.359000 audit[2630]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe259fd97b a2=241 a3=1b6 items=1 ppid=2594 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.359000 audit[2631]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffece51197b a2=241 a3=1b6 items=1 ppid=2591 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.359000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 19:18:00.359000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 19:18:00.359000 audit[2628]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd2df196c a2=241 a3=1b6 items=1 ppid=2592 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.359000 audit[2637]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe14ecd96b a2=241 a3=1b6 items=1 ppid=2590 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.359000 audit[2627]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda119697d a2=241 a3=1b6 items=1 ppid=2596 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.359000 audit: PATH item=0 name="/dev/fd/63" inode=18343 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:00.359000 audit: PATH item=0 name="/dev/fd/63" inode=29154 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:00.359000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 19:18:00.359000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 19:18:00.359000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 19:18:00.359000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:18:00.359000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:18:00.359000 audit: PATH item=0 name="/dev/fd/63" inode=26395 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:00.359000 audit: PATH item=0 name="/dev/fd/63" inode=27230 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:00.359000 audit: PATH item=0 name="/dev/fd/63" inode=21369 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:00.359000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:18:00.359000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:18:00.359000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:18:00.360000 audit[2638]: AVC avc: denied { write } for pid=2638 comm="tee" name="fd" dev="proc" ino=21372 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:18:00.360000 audit[2638]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4558297c a2=241 a3=1b6 items=1 ppid=2589 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.360000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 19:18:00.360000 audit: PATH item=0 name="/dev/fd/63" inode=22245 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:00.360000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:18:00.360000 audit[2629]: AVC avc: denied { write } for pid=2629 comm="tee" name="fd" dev="proc" ino=30823 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:18:00.360000 audit[2629]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7a7f997b a2=241 a3=1b6 items=1 ppid=2595 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.360000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 19:18:00.360000 audit: PATH item=0 name="/dev/fd/63" inode=29880 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:00.360000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:18:00.438520 kernel: Initializing XFRM netlink socket Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.488000 audit: BPF prog-id=84 op=LOAD Apr 12 19:18:00.488000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0fed4650 a2=70 a3=7f5a7fc4f000 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.488000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit: BPF prog-id=84 op=UNLOAD Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit: BPF prog-id=85 op=LOAD Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0fed4650 a2=70 a3=6f items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit: BPF prog-id=85 op=UNLOAD Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd0fed4600 a2=70 a3=7ffd0fed4650 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit: BPF prog-id=86 op=LOAD Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd0fed45e0 a2=70 a3=7ffd0fed4650 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit: BPF prog-id=86 op=UNLOAD Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0fed46c0 a2=70 a3=0 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0fed46b0 a2=70 a3=0 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0fed4620 a2=70 a3=0 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd0fed46f0 a2=70 a3=e02e10 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd0fed46f0 a2=70 a3=dff880 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.489000 audit: BPF prog-id=87 op=LOAD Apr 12 19:18:00.489000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd0fed4610 a2=70 a3=0 items=0 ppid=2600 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:18:00.490000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.490000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffef3ef5740 a2=70 a3=fff80800 items=0 ppid=2600 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.490000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:18:00.490000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:00.490000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffef3ef5610 a2=70 a3=3 items=0 ppid=2600 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.490000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:18:00.500000 audit: BPF prog-id=87 op=UNLOAD Apr 12 19:18:00.501927 kubelet[1875]: E0412 19:18:00.501879 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:00.594000 audit[2830]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:00.594000 audit[2830]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcd5152b50 a2=0 a3=7ffcd5152b3c items=0 ppid=2600 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.594000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:00.600000 audit[2828]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2828 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:00.600000 audit[2828]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffca2214ed0 a2=0 a3=7ffca2214ebc items=0 ppid=2600 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:00.602000 audit[2829]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:00.602000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffbb1eeb90 a2=0 a3=7fffbb1eeb7c items=0 ppid=2600 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.602000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:00.605000 audit[2833]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:00.605000 audit[2833]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd5d558950 a2=0 a3=7ffd5d55893c items=0 ppid=2600 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:00.605000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:00.649013 kubelet[1875]: I0412 19:18:00.648845 1875 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:18:01.459566 systemd-networkd[1298]: vxlan.calico: Link UP Apr 12 19:18:01.459569 systemd-networkd[1298]: vxlan.calico: Gained carrier Apr 12 19:18:01.503029 kubelet[1875]: E0412 19:18:01.502922 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:02.503187 kubelet[1875]: E0412 19:18:02.503105 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:03.132806 systemd-networkd[1298]: vxlan.calico: Gained IPv6LL Apr 12 19:18:03.503571 kubelet[1875]: E0412 19:18:03.503333 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:04.504539 kubelet[1875]: E0412 19:18:04.504411 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:05.505531 kubelet[1875]: E0412 19:18:05.505399 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:05.649606 systemd[1]: Started sshd@7-139.178.89.219:22-158.51.96.38:35788.service. Apr 12 19:18:05.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.219:22-158.51.96.38:35788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:05.676547 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 19:18:05.676627 kernel: audit: type=1130 audit(1712949485.649:691): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.219:22-158.51.96.38:35788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:05.932078 sshd[2851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:05.931000 audit[2851]: USER_AUTH pid=2851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:06.028674 kernel: audit: type=1100 audit(1712949485.931:692): pid=2851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:06.505910 kubelet[1875]: E0412 19:18:06.505794 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:07.185484 kubelet[1875]: I0412 19:18:07.185378 1875 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:18:07.234838 kubelet[1875]: I0412 19:18:07.234803 1875 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-649x8" podStartSLOduration=12.532394771 podStartE2EDuration="29.234777293s" podCreationTimestamp="2024-04-12 19:17:38 +0000 UTC" firstStartedPulling="2024-04-12 19:17:41.471694461 +0000 UTC m=+3.206326220" lastFinishedPulling="2024-04-12 19:17:58.174076983 +0000 UTC m=+19.908708742" observedRunningTime="2024-04-12 19:17:59.678173436 +0000 UTC m=+21.412805257" watchObservedRunningTime="2024-04-12 19:18:07.234777293 +0000 UTC m=+28.969409050" Apr 12 19:18:07.506850 kubelet[1875]: E0412 19:18:07.506633 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:08.010905 sshd[2851]: Failed password for root from 158.51.96.38 port 35788 ssh2 Apr 12 19:18:08.102109 sshd[2851]: Connection closed by authenticating user root 158.51.96.38 port 35788 [preauth] Apr 12 19:18:08.104739 systemd[1]: sshd@7-139.178.89.219:22-158.51.96.38:35788.service: Deactivated successfully. Apr 12 19:18:08.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.219:22-158.51.96.38:35788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:08.111306 systemd[1]: Started sshd@8-139.178.89.219:22-158.51.96.38:9256.service. Apr 12 19:18:08.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.219:22-158.51.96.38:9256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:08.196577 kernel: audit: type=1131 audit(1712949488.103:693): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.219:22-158.51.96.38:35788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:08.196663 kernel: audit: type=1130 audit(1712949488.109:694): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.219:22-158.51.96.38:9256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:08.369321 sshd[2905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:08.369000 audit[2905]: USER_AUTH pid=2905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:08.464688 kernel: audit: type=1100 audit(1712949488.369:695): pid=2905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:08.508020 kubelet[1875]: E0412 19:18:08.507903 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:08.580133 env[1469]: time="2024-04-12T19:18:08.579977162Z" level=info msg="StopPodSandbox for \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\"" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.666 [INFO][2923] k8s.go 585: Cleaning up netns ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.667 [INFO][2923] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" iface="eth0" netns="/var/run/netns/cni-f3a0eb27-c42f-aa97-0127-01a264ce3370" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.667 [INFO][2923] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" iface="eth0" netns="/var/run/netns/cni-f3a0eb27-c42f-aa97-0127-01a264ce3370" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.667 [INFO][2923] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" iface="eth0" netns="/var/run/netns/cni-f3a0eb27-c42f-aa97-0127-01a264ce3370" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.668 [INFO][2923] k8s.go 592: Releasing IP address(es) ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.668 [INFO][2923] utils.go 188: Calico CNI releasing IP address ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.713 [INFO][2939] ipam_plugin.go 415: Releasing address using handleID ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.714 [INFO][2939] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.714 [INFO][2939] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.724 [WARNING][2939] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.724 [INFO][2939] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.726 [INFO][2939] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:08.729123 env[1469]: 2024-04-12 19:18:08.727 [INFO][2923] k8s.go 598: Teardown processing complete. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:08.729970 env[1469]: time="2024-04-12T19:18:08.729224397Z" level=info msg="TearDown network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\" successfully" Apr 12 19:18:08.729970 env[1469]: time="2024-04-12T19:18:08.729277686Z" level=info msg="StopPodSandbox for \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\" returns successfully" Apr 12 19:18:08.730126 env[1469]: time="2024-04-12T19:18:08.729978816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q9swx,Uid:a4c5c209-9142-46fb-ae3b-3a69e8c3121d,Namespace:calico-system,Attempt:1,}" Apr 12 19:18:08.731431 systemd[1]: run-netns-cni\x2df3a0eb27\x2dc42f\x2daa97\x2d0127\x2d01a264ce3370.mount: Deactivated successfully. Apr 12 19:18:08.888508 systemd-networkd[1298]: cali34b80987103: Link UP Apr 12 19:18:08.957945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:18:08.957989 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali34b80987103: link becomes ready Apr 12 19:18:08.957963 systemd-networkd[1298]: cali34b80987103: Gained carrier Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.769 [INFO][2955] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.9-k8s-csi--node--driver--q9swx-eth0 csi-node-driver- calico-system a4c5c209-9142-46fb-ae3b-3a69e8c3121d 1578 0 2024-04-12 19:17:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.9 csi-node-driver-q9swx eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali34b80987103 [] []}} ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.769 [INFO][2955] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.835 [INFO][2979] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" HandleID="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.850 [INFO][2979] ipam_plugin.go 268: Auto assigning IP ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" HandleID="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a4890), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.9", "pod":"csi-node-driver-q9swx", "timestamp":"2024-04-12 19:18:08.835323936 +0000 UTC"}, Hostname:"10.67.80.9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.850 [INFO][2979] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.850 [INFO][2979] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.850 [INFO][2979] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.9' Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.852 [INFO][2979] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.856 [INFO][2979] ipam.go 372: Looking up existing affinities for host host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.861 [INFO][2979] ipam.go 489: Trying affinity for 192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.864 [INFO][2979] ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.866 [INFO][2979] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.866 [INFO][2979] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.868 [INFO][2979] ipam.go 1682: Creating new handle: k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.872 [INFO][2979] ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.877 [INFO][2979] ipam.go 1216: Successfully claimed IPs: [192.168.74.129/26] block=192.168.74.128/26 handle="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.877 [INFO][2979] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.129/26] handle="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" host="10.67.80.9" Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.877 [INFO][2979] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:08.972833 env[1469]: 2024-04-12 19:18:08.877 [INFO][2979] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.74.129/26] IPv6=[] ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" HandleID="k8s-pod-network.ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.973393 env[1469]: 2024-04-12 19:18:08.885 [INFO][2955] k8s.go 385: Populated endpoint ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-csi--node--driver--q9swx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a4c5c209-9142-46fb-ae3b-3a69e8c3121d", ResourceVersion:"1578", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"", Pod:"csi-node-driver-q9swx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali34b80987103", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:08.973393 env[1469]: 2024-04-12 19:18:08.885 [INFO][2955] k8s.go 386: Calico CNI using IPs: [192.168.74.129/32] ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.973393 env[1469]: 2024-04-12 19:18:08.885 [INFO][2955] dataplane_linux.go 68: Setting the host side veth name to cali34b80987103 ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.973393 env[1469]: 2024-04-12 19:18:08.957 [INFO][2955] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.973393 env[1469]: 2024-04-12 19:18:08.958 [INFO][2955] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-csi--node--driver--q9swx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a4c5c209-9142-46fb-ae3b-3a69e8c3121d", ResourceVersion:"1578", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e", Pod:"csi-node-driver-q9swx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali34b80987103", MAC:"6a:2c:f6:45:9c:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:08.973393 env[1469]: 2024-04-12 19:18:08.972 [INFO][2955] k8s.go 498: Wrote updated endpoint to datastore ContainerID="ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e" Namespace="calico-system" Pod="csi-node-driver-q9swx" WorkloadEndpoint="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:08.978069 env[1469]: time="2024-04-12T19:18:08.978034883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:18:08.978069 env[1469]: time="2024-04-12T19:18:08.978056122Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:18:08.978069 env[1469]: time="2024-04-12T19:18:08.978063158Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:18:08.978251 env[1469]: time="2024-04-12T19:18:08.978195633Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e pid=3018 runtime=io.containerd.runc.v2 Apr 12 19:18:08.979000 audit[3029]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:08.986443 systemd[1]: Started cri-containerd-ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e.scope. Apr 12 19:18:08.979000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffd5e7d7b20 a2=0 a3=7ffd5e7d7b0c items=0 ppid=2600 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.132286 kernel: audit: type=1325 audit(1712949488.979:696): table=filter:69 family=2 entries=36 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:09.132346 kernel: audit: type=1300 audit(1712949488.979:696): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffd5e7d7b20 a2=0 a3=7ffd5e7d7b0c items=0 ppid=2600 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.132365 kernel: audit: type=1327 audit(1712949488.979:696): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:08.979000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.193557 kernel: audit: type=1400 audit(1712949489.043:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.255574 kernel: audit: type=1400 audit(1712949489.043:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit: BPF prog-id=88 op=LOAD Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3018 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363766643636376631623331383664633335376364333038653766 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3018 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363766643636376631623331383664633335376364333038653766 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.192000 audit: BPF prog-id=89 op=LOAD Apr 12 19:18:09.192000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00024d310 items=0 ppid=3018 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363766643636376631623331383664633335376364333038653766 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit: BPF prog-id=90 op=LOAD Apr 12 19:18:09.316000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00024d358 items=0 ppid=3018 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363766643636376631623331383664633335376364333038653766 Apr 12 19:18:09.316000 audit: BPF prog-id=90 op=UNLOAD Apr 12 19:18:09.316000 audit: BPF prog-id=89 op=UNLOAD Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.316000 audit: BPF prog-id=91 op=LOAD Apr 12 19:18:09.316000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00024d768 items=0 ppid=3018 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363766643636376631623331383664633335376364333038653766 Apr 12 19:18:09.321637 env[1469]: time="2024-04-12T19:18:09.321611122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-q9swx,Uid:a4c5c209-9142-46fb-ae3b-3a69e8c3121d,Namespace:calico-system,Attempt:1,} returns sandbox id \"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e\"" Apr 12 19:18:09.322272 env[1469]: time="2024-04-12T19:18:09.322261377Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 19:18:09.509017 kubelet[1875]: E0412 19:18:09.508794 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:09.579461 env[1469]: time="2024-04-12T19:18:09.579368203Z" level=info msg="StopPodSandbox for \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\"" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.651 [INFO][3068] k8s.go 585: Cleaning up netns ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.651 [INFO][3068] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" iface="eth0" netns="/var/run/netns/cni-26a0f6f7-af70-9832-b756-1b3277494b34" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.651 [INFO][3068] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" iface="eth0" netns="/var/run/netns/cni-26a0f6f7-af70-9832-b756-1b3277494b34" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.651 [INFO][3068] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" iface="eth0" netns="/var/run/netns/cni-26a0f6f7-af70-9832-b756-1b3277494b34" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.651 [INFO][3068] k8s.go 592: Releasing IP address(es) ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.651 [INFO][3068] utils.go 188: Calico CNI releasing IP address ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.668 [INFO][3085] ipam_plugin.go 415: Releasing address using handleID ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.668 [INFO][3085] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.668 [INFO][3085] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.674 [WARNING][3085] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.674 [INFO][3085] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.676 [INFO][3085] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:09.678496 env[1469]: 2024-04-12 19:18:09.677 [INFO][3068] k8s.go 598: Teardown processing complete. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:09.679284 env[1469]: time="2024-04-12T19:18:09.678608949Z" level=info msg="TearDown network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\" successfully" Apr 12 19:18:09.679284 env[1469]: time="2024-04-12T19:18:09.678636613Z" level=info msg="StopPodSandbox for \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\" returns successfully" Apr 12 19:18:09.679284 env[1469]: time="2024-04-12T19:18:09.679083621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-q2j2x,Uid:7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a,Namespace:default,Attempt:1,}" Apr 12 19:18:09.732128 systemd[1]: run-netns-cni\x2d26a0f6f7\x2daf70\x2d9832\x2db756\x2d1b3277494b34.mount: Deactivated successfully. Apr 12 19:18:09.821054 systemd-networkd[1298]: cali12278e0ba60: Link UP Apr 12 19:18:09.863543 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali12278e0ba60: link becomes ready Apr 12 19:18:09.863791 systemd-networkd[1298]: cali12278e0ba60: Gained carrier Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.718 [INFO][3104] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0 nginx-deployment-6d5f899847- default 7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a 1589 0 2024-04-12 19:17:56 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.9 nginx-deployment-6d5f899847-q2j2x eth0 default [] [] [kns.default ksa.default.default] cali12278e0ba60 [] []}} ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.718 [INFO][3104] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.744 [INFO][3127] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" HandleID="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.763 [INFO][3127] ipam_plugin.go 268: Auto assigning IP ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" HandleID="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002aa640), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.9", "pod":"nginx-deployment-6d5f899847-q2j2x", "timestamp":"2024-04-12 19:18:09.744458969 +0000 UTC"}, Hostname:"10.67.80.9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.763 [INFO][3127] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.763 [INFO][3127] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.763 [INFO][3127] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.9' Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.766 [INFO][3127] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.774 [INFO][3127] ipam.go 372: Looking up existing affinities for host host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.782 [INFO][3127] ipam.go 489: Trying affinity for 192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.786 [INFO][3127] ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.791 [INFO][3127] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.791 [INFO][3127] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.795 [INFO][3127] ipam.go 1682: Creating new handle: k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791 Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.802 [INFO][3127] ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.813 [INFO][3127] ipam.go 1216: Successfully claimed IPs: [192.168.74.130/26] block=192.168.74.128/26 handle="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.813 [INFO][3127] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.130/26] handle="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" host="10.67.80.9" Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.813 [INFO][3127] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:09.875553 env[1469]: 2024-04-12 19:18:09.813 [INFO][3127] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.74.130/26] IPv6=[] ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" HandleID="k8s-pod-network.060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.876683 env[1469]: 2024-04-12 19:18:09.817 [INFO][3104] k8s.go 385: Populated endpoint ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a", ResourceVersion:"1589", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"", Pod:"nginx-deployment-6d5f899847-q2j2x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali12278e0ba60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:09.876683 env[1469]: 2024-04-12 19:18:09.817 [INFO][3104] k8s.go 386: Calico CNI using IPs: [192.168.74.130/32] ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.876683 env[1469]: 2024-04-12 19:18:09.817 [INFO][3104] dataplane_linux.go 68: Setting the host side veth name to cali12278e0ba60 ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.876683 env[1469]: 2024-04-12 19:18:09.863 [INFO][3104] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.876683 env[1469]: 2024-04-12 19:18:09.864 [INFO][3104] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a", ResourceVersion:"1589", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791", Pod:"nginx-deployment-6d5f899847-q2j2x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali12278e0ba60", MAC:"2e:af:b1:32:cc:97", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:09.876683 env[1469]: 2024-04-12 19:18:09.874 [INFO][3104] k8s.go 498: Wrote updated endpoint to datastore ContainerID="060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791" Namespace="default" Pod="nginx-deployment-6d5f899847-q2j2x" WorkloadEndpoint="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:09.885283 env[1469]: time="2024-04-12T19:18:09.885221890Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:18:09.885283 env[1469]: time="2024-04-12T19:18:09.885260623Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:18:09.885451 env[1469]: time="2024-04-12T19:18:09.885281662Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:18:09.885451 env[1469]: time="2024-04-12T19:18:09.885423098Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791 pid=3165 runtime=io.containerd.runc.v2 Apr 12 19:18:09.888000 audit[3175]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:09.888000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=21560 a0=3 a1=7fffab04d5c0 a2=0 a3=7fffab04d5ac items=0 ppid=2600 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.888000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:09.898061 systemd[1]: Started cri-containerd-060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791.scope. Apr 12 19:18:09.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit: BPF prog-id=92 op=LOAD Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3165 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306663623738653230343338336364303937383635386463323965 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3165 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306663623738653230343338336364303937383635386463323965 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit: BPF prog-id=93 op=LOAD Apr 12 19:18:09.906000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f2000 items=0 ppid=3165 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306663623738653230343338336364303937383635386463323965 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.906000 audit: BPF prog-id=94 op=LOAD Apr 12 19:18:09.906000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f2048 items=0 ppid=3165 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306663623738653230343338336364303937383635386463323965 Apr 12 19:18:09.906000 audit: BPF prog-id=94 op=UNLOAD Apr 12 19:18:09.906000 audit: BPF prog-id=93 op=UNLOAD Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:09.907000 audit: BPF prog-id=95 op=LOAD Apr 12 19:18:09.907000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f2458 items=0 ppid=3165 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:09.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036306663623738653230343338336364303937383635386463323965 Apr 12 19:18:09.932350 env[1469]: time="2024-04-12T19:18:09.932322766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-q2j2x,Uid:7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a,Namespace:default,Attempt:1,} returns sandbox id \"060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791\"" Apr 12 19:18:10.364796 systemd-networkd[1298]: cali34b80987103: Gained IPv6LL Apr 12 19:18:10.509868 kubelet[1875]: E0412 19:18:10.509795 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:10.860384 sshd[2905]: Failed password for root from 158.51.96.38 port 9256 ssh2 Apr 12 19:18:10.897333 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2331384130.mount: Deactivated successfully. Apr 12 19:18:11.393491 env[1469]: time="2024-04-12T19:18:11.393429797Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:11.394069 env[1469]: time="2024-04-12T19:18:11.394037431Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:11.394761 env[1469]: time="2024-04-12T19:18:11.394729812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:11.395546 env[1469]: time="2024-04-12T19:18:11.395492792Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:11.395872 env[1469]: time="2024-04-12T19:18:11.395828271Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 19:18:11.396344 env[1469]: time="2024-04-12T19:18:11.396304263Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 19:18:11.397124 env[1469]: time="2024-04-12T19:18:11.397089003Z" level=info msg="CreateContainer within sandbox \"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 19:18:11.403159 env[1469]: time="2024-04-12T19:18:11.403116179Z" level=info msg="CreateContainer within sandbox \"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9c63423c69e684dc9af2361e289b9121b1b8f848ce1691842f9fe67d948e685b\"" Apr 12 19:18:11.403446 env[1469]: time="2024-04-12T19:18:11.403414230Z" level=info msg="StartContainer for \"9c63423c69e684dc9af2361e289b9121b1b8f848ce1691842f9fe67d948e685b\"" Apr 12 19:18:11.412066 systemd[1]: Started cri-containerd-9c63423c69e684dc9af2361e289b9121b1b8f848ce1691842f9fe67d948e685b.scope. Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.446864 kernel: kauditd_printk_skb: 115 callbacks suppressed Apr 12 19:18:11.446946 kernel: audit: type=1400 audit(1712949491.419:734): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f14e8842248 items=0 ppid=3018 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:11.510458 kubelet[1875]: E0412 19:18:11.510417 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:11.602236 kernel: audit: type=1300 audit(1712949491.419:734): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f14e8842248 items=0 ppid=3018 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:11.602268 kernel: audit: type=1327 audit(1712949491.419:734): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363334323363363965363834646339616632333631653238396239 Apr 12 19:18:11.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363334323363363965363834646339616632333631653238396239 Apr 12 19:18:11.692106 kernel: audit: type=1400 audit(1712949491.419:735): avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.814508 kernel: audit: type=1400 audit(1712949491.419:735): avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.814534 kernel: audit: type=1400 audit(1712949491.419:735): avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.880783 env[1469]: time="2024-04-12T19:18:11.880757886Z" level=info msg="StartContainer for \"9c63423c69e684dc9af2361e289b9121b1b8f848ce1691842f9fe67d948e685b\" returns successfully" Apr 12 19:18:11.900624 systemd-networkd[1298]: cali12278e0ba60: Gained IPv6LL Apr 12 19:18:11.937736 kernel: audit: type=1400 audit(1712949491.419:735): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.937763 kernel: audit: type=1400 audit(1712949491.419:735): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:12.000567 kernel: audit: type=1400 audit(1712949491.419:735): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:12.063392 kernel: audit: type=1400 audit(1712949491.419:735): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.419000 audit: BPF prog-id=96 op=LOAD Apr 12 19:18:11.419000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00039adb8 items=0 ppid=3018 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:11.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363334323363363965363834646339616632333631653238396239 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.508000 audit: BPF prog-id=97 op=LOAD Apr 12 19:18:11.508000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00039ae08 items=0 ppid=3018 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:11.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363334323363363965363834646339616632333631653238396239 Apr 12 19:18:11.691000 audit: BPF prog-id=97 op=UNLOAD Apr 12 19:18:11.691000 audit: BPF prog-id=96 op=UNLOAD Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:11.691000 audit: BPF prog-id=98 op=LOAD Apr 12 19:18:11.691000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00039ae98 items=0 ppid=3018 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:11.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363334323363363965363834646339616632333631653238396239 Apr 12 19:18:12.510895 kubelet[1875]: E0412 19:18:12.510775 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:12.733112 sshd[2905]: Connection closed by authenticating user root 158.51.96.38 port 9256 [preauth] Apr 12 19:18:12.733732 systemd[1]: sshd@8-139.178.89.219:22-158.51.96.38:9256.service: Deactivated successfully. Apr 12 19:18:12.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.219:22-158.51.96.38:9256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:12.745390 systemd[1]: Started sshd@9-139.178.89.219:22-158.51.96.38:9274.service. Apr 12 19:18:12.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.219:22-158.51.96.38:9274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:12.809604 update_engine[1461]: I0412 19:18:12.809573 1461 update_attempter.cc:509] Updating boot flags... Apr 12 19:18:12.863169 sshd[3246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:12.862000 audit[3246]: USER_AUTH pid=3246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:13.511272 kubelet[1875]: E0412 19:18:13.511227 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:13.582548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2262600030.mount: Deactivated successfully. Apr 12 19:18:14.105368 env[1469]: time="2024-04-12T19:18:14.105335608Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:14.106539 env[1469]: time="2024-04-12T19:18:14.106499561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:14.107445 env[1469]: time="2024-04-12T19:18:14.107404194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:14.108346 env[1469]: time="2024-04-12T19:18:14.108302082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:14.109110 env[1469]: time="2024-04-12T19:18:14.109065979Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 19:18:14.109396 env[1469]: time="2024-04-12T19:18:14.109383074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 19:18:14.110132 env[1469]: time="2024-04-12T19:18:14.110116623Z" level=info msg="CreateContainer within sandbox \"060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 19:18:14.114360 env[1469]: time="2024-04-12T19:18:14.114318005Z" level=info msg="CreateContainer within sandbox \"060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"bdbdb57b5592f0d9e26e850af1c81a0a7abdc6451eaadfcc20bb48eef2d716fe\"" Apr 12 19:18:14.114575 env[1469]: time="2024-04-12T19:18:14.114547182Z" level=info msg="StartContainer for \"bdbdb57b5592f0d9e26e850af1c81a0a7abdc6451eaadfcc20bb48eef2d716fe\"" Apr 12 19:18:14.123349 systemd[1]: Started cri-containerd-bdbdb57b5592f0d9e26e850af1c81a0a7abdc6451eaadfcc20bb48eef2d716fe.scope. Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.127000 audit: BPF prog-id=99 op=LOAD Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3165 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626462353762353539326630643965323665383530616631633831 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3165 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626462353762353539326630643965323665383530616631633831 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit: BPF prog-id=100 op=LOAD Apr 12 19:18:14.128000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025fd10 items=0 ppid=3165 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626462353762353539326630643965323665383530616631633831 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit: BPF prog-id=101 op=LOAD Apr 12 19:18:14.128000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025fd58 items=0 ppid=3165 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626462353762353539326630643965323665383530616631633831 Apr 12 19:18:14.128000 audit: BPF prog-id=101 op=UNLOAD Apr 12 19:18:14.128000 audit: BPF prog-id=100 op=UNLOAD Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { perfmon } for pid=3271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit[3271]: AVC avc: denied { bpf } for pid=3271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:14.128000 audit: BPF prog-id=102 op=LOAD Apr 12 19:18:14.128000 audit[3271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cc168 items=0 ppid=3165 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626462353762353539326630643965323665383530616631633831 Apr 12 19:18:14.133881 env[1469]: time="2024-04-12T19:18:14.133858957Z" level=info msg="StartContainer for \"bdbdb57b5592f0d9e26e850af1c81a0a7abdc6451eaadfcc20bb48eef2d716fe\" returns successfully" Apr 12 19:18:14.512181 kubelet[1875]: E0412 19:18:14.511950 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:14.705057 kubelet[1875]: I0412 19:18:14.704949 1875 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-q2j2x" podStartSLOduration=14.528482548 podStartE2EDuration="18.704862697s" podCreationTimestamp="2024-04-12 19:17:56 +0000 UTC" firstStartedPulling="2024-04-12 19:18:09.932884807 +0000 UTC m=+31.667516565" lastFinishedPulling="2024-04-12 19:18:14.109264956 +0000 UTC m=+35.843896714" observedRunningTime="2024-04-12 19:18:14.704301091 +0000 UTC m=+36.438932913" watchObservedRunningTime="2024-04-12 19:18:14.704862697 +0000 UTC m=+36.439494503" Apr 12 19:18:14.902238 sshd[3246]: Failed password for root from 158.51.96.38 port 9274 ssh2 Apr 12 19:18:15.023435 sshd[3246]: Connection closed by authenticating user root 158.51.96.38 port 9274 [preauth] Apr 12 19:18:15.025837 systemd[1]: sshd@9-139.178.89.219:22-158.51.96.38:9274.service: Deactivated successfully. Apr 12 19:18:15.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.219:22-158.51.96.38:9274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:15.512244 kubelet[1875]: E0412 19:18:15.512116 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:16.046529 systemd[1]: Started sshd@10-139.178.89.219:22-158.51.96.38:9282.service. Apr 12 19:18:16.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.219:22-158.51.96.38:9282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:16.097700 env[1469]: time="2024-04-12T19:18:16.097647094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:16.098252 env[1469]: time="2024-04-12T19:18:16.098211709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:16.098810 env[1469]: time="2024-04-12T19:18:16.098767133Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:16.099441 env[1469]: time="2024-04-12T19:18:16.099406673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:16.099819 env[1469]: time="2024-04-12T19:18:16.099774730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 19:18:16.100933 env[1469]: time="2024-04-12T19:18:16.100917473Z" level=info msg="CreateContainer within sandbox \"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 19:18:16.106177 env[1469]: time="2024-04-12T19:18:16.106129718Z" level=info msg="CreateContainer within sandbox \"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"733b594d9d614d81b5262a8730e10df4e4b9e0cd522b4138de907d12735048d0\"" Apr 12 19:18:16.106395 env[1469]: time="2024-04-12T19:18:16.106380819Z" level=info msg="StartContainer for \"733b594d9d614d81b5262a8730e10df4e4b9e0cd522b4138de907d12735048d0\"" Apr 12 19:18:16.115581 systemd[1]: Started cri-containerd-733b594d9d614d81b5262a8730e10df4e4b9e0cd522b4138de907d12735048d0.scope. Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f05bd5213c8 items=0 ppid=3018 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:16.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336235393464396436313464383162353236326138373330653130 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit: BPF prog-id=103 op=LOAD Apr 12 19:18:16.122000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000410198 items=0 ppid=3018 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:16.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336235393464396436313464383162353236326138373330653130 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit: BPF prog-id=104 op=LOAD Apr 12 19:18:16.122000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0004101e8 items=0 ppid=3018 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:16.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336235393464396436313464383162353236326138373330653130 Apr 12 19:18:16.122000 audit: BPF prog-id=104 op=UNLOAD Apr 12 19:18:16.122000 audit: BPF prog-id=103 op=UNLOAD Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:16.122000 audit: BPF prog-id=105 op=LOAD Apr 12 19:18:16.122000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000410278 items=0 ppid=3018 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:16.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336235393464396436313464383162353236326138373330653130 Apr 12 19:18:16.128527 env[1469]: time="2024-04-12T19:18:16.128500572Z" level=info msg="StartContainer for \"733b594d9d614d81b5262a8730e10df4e4b9e0cd522b4138de907d12735048d0\" returns successfully" Apr 12 19:18:16.209212 sshd[3339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:16.209000 audit[3339]: USER_AUTH pid=3339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:16.512845 kubelet[1875]: E0412 19:18:16.512599 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:16.551882 kubelet[1875]: I0412 19:18:16.551780 1875 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 19:18:16.551882 kubelet[1875]: I0412 19:18:16.551858 1875 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 19:18:16.722992 kubelet[1875]: I0412 19:18:16.722879 1875 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-q9swx" podStartSLOduration=31.944899012 podStartE2EDuration="38.722782806s" podCreationTimestamp="2024-04-12 19:17:38 +0000 UTC" firstStartedPulling="2024-04-12 19:18:09.322133145 +0000 UTC m=+31.056764901" lastFinishedPulling="2024-04-12 19:18:16.100016936 +0000 UTC m=+37.834648695" observedRunningTime="2024-04-12 19:18:16.722620833 +0000 UTC m=+38.457252685" watchObservedRunningTime="2024-04-12 19:18:16.722782806 +0000 UTC m=+38.457414613" Apr 12 19:18:17.513399 kubelet[1875]: E0412 19:18:17.513276 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:18.464620 sshd[3339]: Failed password for root from 158.51.96.38 port 9282 ssh2 Apr 12 19:18:18.486822 kubelet[1875]: E0412 19:18:18.486710 1875 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:18.514303 kubelet[1875]: E0412 19:18:18.514184 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:19.157257 kubelet[1875]: I0412 19:18:19.157215 1875 topology_manager.go:215] "Topology Admit Handler" podUID="bf2708fc-7389-4bfa-9575-f3ef0636aadc" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 19:18:19.156000 audit[3386]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:19.160786 systemd[1]: Created slice kubepods-besteffort-podbf2708fc_7389_4bfa_9575_f3ef0636aadc.slice. Apr 12 19:18:19.184811 kernel: kauditd_printk_skb: 139 callbacks suppressed Apr 12 19:18:19.184912 kernel: audit: type=1325 audit(1712949499.156:770): table=filter:71 family=2 entries=20 op=nft_register_rule pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:19.156000 audit[3386]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe3f1da3d0 a2=0 a3=7ffe3f1da3bc items=0 ppid=2104 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.279300 kubelet[1875]: I0412 19:18:19.279253 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/bf2708fc-7389-4bfa-9575-f3ef0636aadc-data\") pod \"nfs-server-provisioner-0\" (UID: \"bf2708fc-7389-4bfa-9575-f3ef0636aadc\") " pod="default/nfs-server-provisioner-0" Apr 12 19:18:19.279367 kubelet[1875]: I0412 19:18:19.279296 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-crrl9\" (UniqueName: \"kubernetes.io/projected/bf2708fc-7389-4bfa-9575-f3ef0636aadc-kube-api-access-crrl9\") pod \"nfs-server-provisioner-0\" (UID: \"bf2708fc-7389-4bfa-9575-f3ef0636aadc\") " pod="default/nfs-server-provisioner-0" Apr 12 19:18:19.340084 kernel: audit: type=1300 audit(1712949499.156:770): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe3f1da3d0 a2=0 a3=7ffe3f1da3bc items=0 ppid=2104 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.340118 kernel: audit: type=1327 audit(1712949499.156:770): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:19.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:19.401000 audit[3386]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:19.401000 audit[3386]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3f1da3d0 a2=0 a3=0 items=0 ppid=2104 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.463331 env[1469]: time="2024-04-12T19:18:19.463299466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:bf2708fc-7389-4bfa-9575-f3ef0636aadc,Namespace:default,Attempt:0,}" Apr 12 19:18:19.515351 kubelet[1875]: E0412 19:18:19.515302 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:19.544929 systemd-networkd[1298]: cali60e51b789ff: Link UP Apr 12 19:18:19.556040 kernel: audit: type=1325 audit(1712949499.401:771): table=nat:72 family=2 entries=22 op=nft_register_rule pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:19.556082 kernel: audit: type=1300 audit(1712949499.401:771): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3f1da3d0 a2=0 a3=0 items=0 ppid=2104 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.556101 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:18:19.556118 kernel: audit: type=1327 audit(1712949499.401:771): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:19.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:19.641866 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 19:18:19.670690 systemd-networkd[1298]: cali60e51b789ff: Gained carrier Apr 12 19:18:19.672000 audit[3432]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.494 [INFO][3391] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.9-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default bf2708fc-7389-4bfa-9575-f3ef0636aadc 1650 0 2024-04-12 19:18:19 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.9 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.494 [INFO][3391] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.511 [INFO][3414] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" HandleID="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Workload="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.520 [INFO][3414] ipam_plugin.go 268: Auto assigning IP ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" HandleID="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Workload="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00028dd60), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.9", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 19:18:19.511127194 +0000 UTC"}, Hostname:"10.67.80.9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.520 [INFO][3414] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.520 [INFO][3414] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.520 [INFO][3414] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.9' Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.522 [INFO][3414] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.526 [INFO][3414] ipam.go 372: Looking up existing affinities for host host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.530 [INFO][3414] ipam.go 489: Trying affinity for 192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.531 [INFO][3414] ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.535 [INFO][3414] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.535 [INFO][3414] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.536 [INFO][3414] ipam.go 1682: Creating new handle: k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.539 [INFO][3414] ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.542 [INFO][3414] ipam.go 1216: Successfully claimed IPs: [192.168.74.131/26] block=192.168.74.128/26 handle="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.542 [INFO][3414] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.131/26] handle="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" host="10.67.80.9" Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.542 [INFO][3414] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:19.685236 env[1469]: 2024-04-12 19:18:19.542 [INFO][3414] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.74.131/26] IPv6=[] ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" HandleID="k8s-pod-network.e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Workload="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:18:19.685640 env[1469]: 2024-04-12 19:18:19.543 [INFO][3391] k8s.go 385: Populated endpoint ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"bf2708fc-7389-4bfa-9575-f3ef0636aadc", ResourceVersion:"1650", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 18, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.74.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:19.685640 env[1469]: 2024-04-12 19:18:19.543 [INFO][3391] k8s.go 386: Calico CNI using IPs: [192.168.74.131/32] ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:18:19.685640 env[1469]: 2024-04-12 19:18:19.543 [INFO][3391] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:18:19.685640 env[1469]: 2024-04-12 19:18:19.670 [INFO][3391] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:18:19.685757 env[1469]: 2024-04-12 19:18:19.670 [INFO][3391] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"bf2708fc-7389-4bfa-9575-f3ef0636aadc", ResourceVersion:"1650", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 18, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.74.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"72:ca:56:31:f6:41", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:19.685757 env[1469]: 2024-04-12 19:18:19.684 [INFO][3391] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.9-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:18:19.690572 env[1469]: time="2024-04-12T19:18:19.690539193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:18:19.690572 env[1469]: time="2024-04-12T19:18:19.690563464Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:18:19.690676 env[1469]: time="2024-04-12T19:18:19.690573350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:18:19.690705 env[1469]: time="2024-04-12T19:18:19.690680806Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd pid=3452 runtime=io.containerd.runc.v2 Apr 12 19:18:19.696997 systemd[1]: Started cri-containerd-e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd.scope. Apr 12 19:18:19.672000 audit[3432]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe7d111570 a2=0 a3=7ffe7d11155c items=0 ppid=2104 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.829548 kernel: audit: type=1325 audit(1712949499.672:772): table=filter:73 family=2 entries=32 op=nft_register_rule pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:19.829615 kernel: audit: type=1300 audit(1712949499.672:772): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe7d111570 a2=0 a3=7ffe7d11155c items=0 ppid=2104 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.829633 kernel: audit: type=1327 audit(1712949499.672:772): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:19.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:19.887397 kernel: audit: type=1400 audit(1712949499.738:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.831000 audit[3432]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:19.831000 audit[3432]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe7d111570 a2=0 a3=0 items=0 ppid=2104 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:19.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit: BPF prog-id=106 op=LOAD Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3452 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537376135386235336364393834663539666665613063373465373633 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3452 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537376135386235336364393834663539666665613063373465373633 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit: BPF prog-id=107 op=LOAD Apr 12 19:18:19.949000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00023cd80 items=0 ppid=3452 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537376135386235336364393834663539666665613063373465373633 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit: BPF prog-id=108 op=LOAD Apr 12 19:18:19.949000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00023cdc8 items=0 ppid=3452 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537376135386235336364393834663539666665613063373465373633 Apr 12 19:18:19.949000 audit: BPF prog-id=108 op=UNLOAD Apr 12 19:18:19.949000 audit: BPF prog-id=107 op=UNLOAD Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:19.949000 audit: BPF prog-id=109 op=LOAD Apr 12 19:18:19.949000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00023d1d8 items=0 ppid=3452 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537376135386235336364393834663539666665613063373465373633 Apr 12 19:18:19.956000 audit[3479]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:19.956000 audit[3479]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffdf6662340 a2=0 a3=7ffdf666232c items=0 ppid=2600 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:19.956000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:19.966916 env[1469]: time="2024-04-12T19:18:19.966890682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:bf2708fc-7389-4bfa-9575-f3ef0636aadc,Namespace:default,Attempt:0,} returns sandbox id \"e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd\"" Apr 12 19:18:19.967611 env[1469]: time="2024-04-12T19:18:19.967598619Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 19:18:20.516203 kubelet[1875]: E0412 19:18:20.516095 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:20.579275 sshd[3339]: Connection closed by authenticating user root 158.51.96.38 port 9282 [preauth] Apr 12 19:18:20.588824 systemd[1]: sshd@10-139.178.89.219:22-158.51.96.38:9282.service: Deactivated successfully. Apr 12 19:18:20.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.219:22-158.51.96.38:9282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:20.589982 systemd[1]: Started sshd@11-139.178.89.219:22-158.51.96.38:20578.service. Apr 12 19:18:20.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.219:22-158.51.96.38:20578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:20.668333 sshd[3487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:20.666000 audit[3487]: ANOM_LOGIN_FAILURES pid=3487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:20.666000 audit[3487]: USER_AUTH pid=3487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:20.668421 sshd[3487]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 19:18:21.516730 kubelet[1875]: E0412 19:18:21.516677 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:21.692663 systemd-networkd[1298]: cali60e51b789ff: Gained IPv6LL Apr 12 19:18:22.100384 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1229474076.mount: Deactivated successfully. Apr 12 19:18:22.517872 kubelet[1875]: E0412 19:18:22.517780 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:23.138596 sshd[3487]: Failed password for root from 158.51.96.38 port 20578 ssh2 Apr 12 19:18:23.314468 env[1469]: time="2024-04-12T19:18:23.314379353Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:23.315240 env[1469]: time="2024-04-12T19:18:23.315185018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:23.316231 env[1469]: time="2024-04-12T19:18:23.316184204Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:23.317597 env[1469]: time="2024-04-12T19:18:23.317526446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:23.317926 env[1469]: time="2024-04-12T19:18:23.317864271Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 19:18:23.319068 env[1469]: time="2024-04-12T19:18:23.319026650Z" level=info msg="CreateContainer within sandbox \"e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 19:18:23.323654 env[1469]: time="2024-04-12T19:18:23.323617700Z" level=info msg="CreateContainer within sandbox \"e77a58b53cd984f59ffea0c74e76389432a536ccdd4adb95366d677378e93ebd\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"533970c6cc7c4f65f3043d3d9363aabadd4ff90d8e138c20cb90824d8bd17898\"" Apr 12 19:18:23.323879 env[1469]: time="2024-04-12T19:18:23.323807736Z" level=info msg="StartContainer for \"533970c6cc7c4f65f3043d3d9363aabadd4ff90d8e138c20cb90824d8bd17898\"" Apr 12 19:18:23.334187 systemd[1]: Started cri-containerd-533970c6cc7c4f65f3043d3d9363aabadd4ff90d8e138c20cb90824d8bd17898.scope. Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.337000 audit: BPF prog-id=110 op=LOAD Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3452 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:23.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333937306336636337633466363566333034336433643933363361 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3452 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:23.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333937306336636337633466363566333034336433643933363361 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit: BPF prog-id=111 op=LOAD Apr 12 19:18:23.338000 audit[3507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e4b90 items=0 ppid=3452 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:23.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333937306336636337633466363566333034336433643933363361 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit: BPF prog-id=112 op=LOAD Apr 12 19:18:23.338000 audit[3507]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002e4bd8 items=0 ppid=3452 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:23.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333937306336636337633466363566333034336433643933363361 Apr 12 19:18:23.338000 audit: BPF prog-id=112 op=UNLOAD Apr 12 19:18:23.338000 audit: BPF prog-id=111 op=UNLOAD Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:23.338000 audit: BPF prog-id=113 op=LOAD Apr 12 19:18:23.338000 audit[3507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002e4fe8 items=0 ppid=3452 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:23.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333937306336636337633466363566333034336433643933363361 Apr 12 19:18:23.345281 env[1469]: time="2024-04-12T19:18:23.345254344Z" level=info msg="StartContainer for \"533970c6cc7c4f65f3043d3d9363aabadd4ff90d8e138c20cb90824d8bd17898\" returns successfully" Apr 12 19:18:23.370000 audit[3536]: AVC avc: denied { search } for pid=3536 comm="rpcbind" name="crypto" dev="proc" ino=26552 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:18:23.370000 audit[3536]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb6634c80c0 a2=0 a3=0 items=0 ppid=3517 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 key=(null) Apr 12 19:18:23.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 19:18:23.389000 audit[3541]: AVC avc: denied { search } for pid=3541 comm="dbus-daemon" name="crypto" dev="proc" ino=26552 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:18:23.389000 audit[3541]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff92776f0c0 a2=0 a3=0 items=0 ppid=3517 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 key=(null) Apr 12 19:18:23.389000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 19:18:23.390000 audit[3542]: AVC avc: denied { watch } for pid=3542 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538067 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c81,c573 tclass=dir permissive=0 Apr 12 19:18:23.390000 audit[3542]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55dac9aef0b0 a2=2c8 a3=7ffdcdd2bc1c items=0 ppid=3517 pid=3542 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 key=(null) Apr 12 19:18:23.390000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 19:18:23.392000 audit[3543]: AVC avc: denied { read } for pid=3543 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22445 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 19:18:23.392000 audit[3543]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f522aef0320 a1=80000 a2=d a3=7ffd54839ee0 items=0 ppid=3517 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 key=(null) Apr 12 19:18:23.392000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 19:18:23.392000 audit[3543]: AVC avc: denied { search } for pid=3543 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26552 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:18:23.392000 audit[3543]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f522a4440c0 a2=0 a3=0 items=0 ppid=3517 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c573 key=(null) Apr 12 19:18:23.392000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 19:18:23.518380 kubelet[1875]: E0412 19:18:23.518306 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:23.746000 audit[3561]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:23.746000 audit[3561]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffa561b4e0 a2=0 a3=7fffa561b4cc items=0 ppid=2104 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:23.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:23.761000 audit[3561]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:18:23.761000 audit[3561]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffa561b4e0 a2=0 a3=7fffa561b4cc items=0 ppid=2104 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:23.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:18:24.518841 kubelet[1875]: E0412 19:18:24.518766 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:24.996647 sshd[3487]: Connection closed by authenticating user root 158.51.96.38 port 20578 [preauth] Apr 12 19:18:24.997307 systemd[1]: sshd@11-139.178.89.219:22-158.51.96.38:20578.service: Deactivated successfully. Apr 12 19:18:24.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.219:22-158.51.96.38:20578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:25.025080 kernel: kauditd_printk_skb: 144 callbacks suppressed Apr 12 19:18:25.025147 kernel: audit: type=1131 audit(1712949504.995:822): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.219:22-158.51.96.38:20578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:25.519966 kubelet[1875]: E0412 19:18:25.519840 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:26.036037 systemd[1]: Started sshd@12-139.178.89.219:22-158.51.96.38:20586.service. Apr 12 19:18:26.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.219:22-158.51.96.38:20586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:26.127546 kernel: audit: type=1130 audit(1712949506.034:823): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.219:22-158.51.96.38:20586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:26.154533 sshd[3567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:26.153000 audit[3567]: USER_AUTH pid=3567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:26.243530 kernel: audit: type=1100 audit(1712949506.153:824): pid=3567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:26.521005 kubelet[1875]: E0412 19:18:26.520779 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:27.521694 kubelet[1875]: E0412 19:18:27.521582 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:27.782445 sshd[3567]: Failed password for root from 158.51.96.38 port 20586 ssh2 Apr 12 19:18:28.314758 sshd[3567]: Connection closed by authenticating user root 158.51.96.38 port 20586 [preauth] Apr 12 19:18:28.317268 systemd[1]: sshd@12-139.178.89.219:22-158.51.96.38:20586.service: Deactivated successfully. Apr 12 19:18:28.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.219:22-158.51.96.38:20586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:28.323277 systemd[1]: Started sshd@13-139.178.89.219:22-158.51.96.38:61276.service. Apr 12 19:18:28.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.219:22-158.51.96.38:61276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:28.499096 kernel: audit: type=1131 audit(1712949508.316:825): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.219:22-158.51.96.38:20586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:28.499131 kernel: audit: type=1130 audit(1712949508.321:826): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.219:22-158.51.96.38:61276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:28.522454 kubelet[1875]: E0412 19:18:28.522412 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:28.530000 audit[3571]: USER_AUTH pid=3571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:28.531889 sshd[3571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:28.621664 kernel: audit: type=1100 audit(1712949508.530:827): pid=3571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:29.523544 kubelet[1875]: E0412 19:18:29.523427 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:30.434783 sshd[3571]: Failed password for root from 158.51.96.38 port 61276 ssh2 Apr 12 19:18:30.524619 kubelet[1875]: E0412 19:18:30.524511 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:30.692681 sshd[3571]: Connection closed by authenticating user root 158.51.96.38 port 61276 [preauth] Apr 12 19:18:30.695173 systemd[1]: sshd@13-139.178.89.219:22-158.51.96.38:61276.service: Deactivated successfully. Apr 12 19:18:30.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.219:22-158.51.96.38:61276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:30.786532 kernel: audit: type=1131 audit(1712949510.694:828): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.219:22-158.51.96.38:61276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:31.525199 kubelet[1875]: E0412 19:18:31.525082 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:31.732366 systemd[1]: Started sshd@14-139.178.89.219:22-158.51.96.38:61282.service. Apr 12 19:18:31.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.219:22-158.51.96.38:61282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:31.823539 kernel: audit: type=1130 audit(1712949511.730:829): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.219:22-158.51.96.38:61282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:32.167597 sshd[3591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:32.166000 audit[3591]: USER_AUTH pid=3591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:32.265576 kernel: audit: type=1100 audit(1712949512.166:830): pid=3591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:32.526152 kubelet[1875]: E0412 19:18:32.526042 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:32.965018 kubelet[1875]: I0412 19:18:32.964792 1875 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=10.614126839 podStartE2EDuration="13.964697273s" podCreationTimestamp="2024-04-12 19:18:19 +0000 UTC" firstStartedPulling="2024-04-12 19:18:19.967453984 +0000 UTC m=+41.702085744" lastFinishedPulling="2024-04-12 19:18:23.318024414 +0000 UTC m=+45.052656178" observedRunningTime="2024-04-12 19:18:23.738442938 +0000 UTC m=+45.473074759" watchObservedRunningTime="2024-04-12 19:18:32.964697273 +0000 UTC m=+54.699329085" Apr 12 19:18:32.965449 kubelet[1875]: I0412 19:18:32.965410 1875 topology_manager.go:215] "Topology Admit Handler" podUID="c4b247a8-bcfa-41e8-a930-6c71652eb897" podNamespace="default" podName="test-pod-1" Apr 12 19:18:32.979904 systemd[1]: Created slice kubepods-besteffort-podc4b247a8_bcfa_41e8_a930_6c71652eb897.slice. Apr 12 19:18:33.106343 kubelet[1875]: I0412 19:18:33.106236 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-b10fca64-09c9-47eb-b816-94da13f5e3c7\" (UniqueName: \"kubernetes.io/nfs/c4b247a8-bcfa-41e8-a930-6c71652eb897-pvc-b10fca64-09c9-47eb-b816-94da13f5e3c7\") pod \"test-pod-1\" (UID: \"c4b247a8-bcfa-41e8-a930-6c71652eb897\") " pod="default/test-pod-1" Apr 12 19:18:33.106343 kubelet[1875]: I0412 19:18:33.106354 1875 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fj5nh\" (UniqueName: \"kubernetes.io/projected/c4b247a8-bcfa-41e8-a930-6c71652eb897-kube-api-access-fj5nh\") pod \"test-pod-1\" (UID: \"c4b247a8-bcfa-41e8-a930-6c71652eb897\") " pod="default/test-pod-1" Apr 12 19:18:33.237000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.353308 kernel: Failed to create system directory netfs Apr 12 19:18:33.353449 kernel: audit: type=1400 audit(1712949513.237:831): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.353498 kernel: Failed to create system directory netfs Apr 12 19:18:33.353575 kernel: audit: type=1400 audit(1712949513.237:831): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.237000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.465085 kernel: Failed to create system directory netfs Apr 12 19:18:33.465130 kernel: audit: type=1400 audit(1712949513.237:831): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.237000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.526807 kubelet[1875]: E0412 19:18:33.526795 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:33.576227 kernel: Failed to create system directory netfs Apr 12 19:18:33.576280 kernel: audit: type=1400 audit(1712949513.237:831): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.237000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.237000 audit[3596]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c6722ef5e0 a1=153bc a2=55c670fce2b0 a3=5 items=0 ppid=123 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:33.237000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:18:33.813000 kernel: audit: type=1300 audit(1712949513.237:831): arch=c000003e syscall=175 success=yes exit=0 a0=55c6722ef5e0 a1=153bc a2=55c670fce2b0 a3=5 items=0 ppid=123 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:33.813030 kernel: audit: type=1327 audit(1712949513.237:831): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.838611 kernel: Failed to create system directory fscache Apr 12 19:18:33.838638 kernel: audit: type=1400 audit(1712949513.689:832): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.838660 kernel: Failed to create system directory fscache Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.973017 kernel: Failed to create system directory fscache Apr 12 19:18:33.973063 kernel: Failed to create system directory fscache Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.021156 kernel: Failed to create system directory fscache Apr 12 19:18:34.021198 kernel: Failed to create system directory fscache Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.068015 kernel: Failed to create system directory fscache Apr 12 19:18:34.068057 kernel: Failed to create system directory fscache Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.113652 kernel: Failed to create system directory fscache Apr 12 19:18:34.113690 kernel: Failed to create system directory fscache Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.157469 kernel: Failed to create system directory fscache Apr 12 19:18:34.157539 kernel: Failed to create system directory fscache Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.198739 kernel: Failed to create system directory fscache Apr 12 19:18:34.198769 kernel: Failed to create system directory fscache Apr 12 19:18:33.689000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:33.689000 audit[3596]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c6725049c0 a1=4c0fc a2=55c670fce2b0 a3=5 items=0 ppid=123 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:33.689000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:18:34.238494 kernel: FS-Cache: Loaded Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.297359 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.297434 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.297505 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.333572 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.333612 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.368165 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.368235 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.401305 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.401376 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.432955 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.433092 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.463317 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.463353 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.492010 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.492046 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.519175 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.519211 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.527468 kubelet[1875]: E0412 19:18:34.527451 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.544911 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.544948 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.569285 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.569315 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.592183 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.592230 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.613983 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.614029 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.617614 sshd[3591]: Failed password for root from 158.51.96.38 port 61282 ssh2 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.634060 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.634106 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.652251 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.652293 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.668700 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.668741 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.683428 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.683470 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.690554 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.703254 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.703323 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.709787 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.716332 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.722853 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.729410 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.735907 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.742439 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.748985 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.755548 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.762024 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.768562 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.775093 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.781523 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.787770 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.794069 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.800325 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.806594 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.812835 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.819104 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.825344 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.831616 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.837864 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.844100 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.850347 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.856616 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.862860 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.869084 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.875357 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.881593 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.887856 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.894105 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.900353 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.906543 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.912839 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.919081 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.925301 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.931534 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.937786 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.944036 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.950253 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.956533 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.962740 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.968946 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.975207 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.981422 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.987686 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:34.993900 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.000141 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.006392 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.012629 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.018860 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.025063 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.031306 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.037528 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.043798 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.050009 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.056256 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.062482 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.068714 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.074940 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.081168 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.087406 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.093642 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.099873 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.106104 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.112322 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.118544 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.124806 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.131044 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.137312 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.143524 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.149785 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.156017 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.162252 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.168511 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.174724 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.180955 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.187201 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.193423 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.199675 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.205898 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.212141 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.218387 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.224639 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.230868 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.237128 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.243357 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.249595 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.255860 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.262076 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.268323 kernel: Failed to create system directory sunrpc Apr 12 19:18:34.251000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.293835 kernel: RPC: Registered named UNIX socket transport module. Apr 12 19:18:35.293866 kernel: RPC: Registered udp transport module. Apr 12 19:18:35.293881 kernel: RPC: Registered tcp transport module. Apr 12 19:18:35.300123 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 19:18:34.251000 audit[3596]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c672550ad0 a1=1a7e9c a2=55c670fce2b0 a3=5 items=6 ppid=123 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:34.251000 audit: CWD cwd="/" Apr 12 19:18:34.251000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:34.251000 audit: PATH item=1 name=(null) inode=29394 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:34.251000 audit: PATH item=2 name=(null) inode=29394 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:34.251000 audit: PATH item=3 name=(null) inode=29395 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:34.251000 audit: PATH item=4 name=(null) inode=29394 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:34.251000 audit: PATH item=5 name=(null) inode=29396 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:18:34.251000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.348871 kernel: Failed to create system directory nfs Apr 12 19:18:35.348951 kernel: Failed to create system directory nfs Apr 12 19:18:35.348963 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.355528 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.362131 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.368761 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.375336 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.388597 kernel: Failed to create system directory nfs Apr 12 19:18:35.388645 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.395293 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.408538 kernel: Failed to create system directory nfs Apr 12 19:18:35.408567 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.415160 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.428405 kernel: Failed to create system directory nfs Apr 12 19:18:35.428434 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.435020 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.441668 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.448277 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.454900 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.461492 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.474805 kernel: Failed to create system directory nfs Apr 12 19:18:35.474867 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.481430 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.488036 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.494676 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.501298 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.507947 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.514541 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.521136 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.527784 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.528363 kubelet[1875]: E0412 19:18:35.528325 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:35.534439 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.541047 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.547690 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.560913 kernel: Failed to create system directory nfs Apr 12 19:18:35.560964 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.567542 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.574228 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.580856 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.587511 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.600690 kernel: Failed to create system directory nfs Apr 12 19:18:35.600723 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.607363 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.613989 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.627074 kernel: Failed to create system directory nfs Apr 12 19:18:35.627155 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.633390 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.639702 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.645912 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.657872 kernel: Failed to create system directory nfs Apr 12 19:18:35.657921 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.663856 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.669858 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.675820 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.681712 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.687748 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.699639 kernel: Failed to create system directory nfs Apr 12 19:18:35.699703 kernel: Failed to create system directory nfs Apr 12 19:18:35.699718 kernel: kauditd_printk_skb: 206 callbacks suppressed Apr 12 19:18:35.699731 kernel: audit: type=1400 audit(1712949515.328:834): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.712274 kernel: Failed to create system directory nfs Apr 12 19:18:35.712303 kernel: audit: type=1400 audit(1712949515.328:834): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.742149 kernel: Failed to create system directory nfs Apr 12 19:18:35.328000 audit[3596]: AVC avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.830879 kernel: audit: type=1400 audit(1712949515.328:834): avc: denied { confidentiality } for pid=3596 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.853517 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 19:18:35.328000 audit[3596]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c672771670 a1=16d85c a2=55c670fce2b0 a3=5 items=0 ppid=123 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:35.328000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:18:35.924192 kernel: audit: type=1300 audit(1712949515.328:834): arch=c000003e syscall=175 success=yes exit=0 a0=55c672771670 a1=16d85c a2=55c670fce2b0 a3=5 items=0 ppid=123 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:35.924241 kernel: audit: type=1327 audit(1712949515.328:834): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:18:35.924257 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.924271 kernel: audit: type=1400 audit(1712949515.871:835): avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.936958 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.937026 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.985919 kernel: audit: type=1400 audit(1712949515.871:835): avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.985944 kernel: audit: type=1400 audit(1712949515.871:835): avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.140747 kernel: Failed to create system directory nfs4 Apr 12 19:18:36.140813 kernel: audit: type=1400 audit(1712949515.871:835): avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.140829 kernel: Failed to create system directory nfs4 Apr 12 19:18:36.140842 kernel: Failed to create system directory nfs4 Apr 12 19:18:36.201741 kernel: audit: type=1400 audit(1712949515.871:835): avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.322352 kernel: Failed to create system directory nfs4 Apr 12 19:18:36.322433 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.341688 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.361050 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.380649 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.400120 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.419611 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.439074 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.458524 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.477994 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.485649 sshd[3591]: Connection closed by authenticating user root 158.51.96.38 port 61282 [preauth] Apr 12 19:18:36.486229 systemd[1]: sshd@14-139.178.89.219:22-158.51.96.38:61282.service: Deactivated successfully. Apr 12 19:18:36.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.219:22-158.51.96.38:61282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:36.491233 systemd[1]: Started sshd@15-139.178.89.219:22-158.51.96.38:61296.service. Apr 12 19:18:36.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.219:22-158.51.96.38:61296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:36.497640 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.516961 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.529227 kubelet[1875]: E0412 19:18:36.529185 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:36.535827 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.554345 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.572273 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.589730 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.606782 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.618577 sshd[3604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:36.617000 audit[3604]: USER_AUTH pid=3604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:36.623352 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.639789 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.655866 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.671525 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.686719 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.701751 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.716358 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.730537 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.744250 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.757556 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.770491 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.783023 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.795143 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.806808 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.818335 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.829862 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.841026 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.851775 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.862053 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.871923 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.881422 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.890415 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.899279 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.907774 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.915801 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.923394 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.930816 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.938282 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.945339 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.951979 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.958182 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.964237 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.970292 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.976377 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.982418 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.988431 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:36.994456 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.000482 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.006546 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.012553 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.018594 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.024631 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.030640 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.036637 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.042638 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.048706 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.054716 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.060695 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.066738 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.072745 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.078716 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.084692 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.090671 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.096663 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.102618 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.108548 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.114547 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.120490 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.126481 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.132433 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.138373 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.144333 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.150266 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.156207 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.162162 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.168089 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.174033 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.180015 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.185982 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.191960 kernel: Failed to create system directory nfs4 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:35.871000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.203981 kernel: Failed to create system directory nfs4 Apr 12 19:18:37.292819 kernel: NFS: Registering the id_resolver key type Apr 12 19:18:37.292875 kernel: Key type id_resolver registered Apr 12 19:18:37.292892 kernel: Key type id_legacy registered Apr 12 19:18:35.871000 audit[3601]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb5b41a2010 a1=208ac4 a2=563a53a742b0 a3=5 items=0 ppid=123 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:35.871000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.320236 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.320267 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.320281 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.326849 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.333470 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.340084 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.346700 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.353305 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.359950 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.366538 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.373175 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.379852 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.386477 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.393116 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.399763 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.406410 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.413050 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.419700 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.426363 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.433027 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.439688 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.446357 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.453024 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.459702 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.466338 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.473043 kernel: Failed to create system directory rpcgss Apr 12 19:18:37.303000 audit[3632]: AVC avc: denied { confidentiality } for pid=3632 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:18:37.303000 audit[3632]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7efe67661010 a1=70c3c a2=55cd16aaa2b0 a3=5 items=0 ppid=123 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:37.303000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 19:18:37.529707 kubelet[1875]: E0412 19:18:37.529651 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:37.671684 nfsidmap[3641]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-a88028f4fa' Apr 12 19:18:37.847139 nfsidmap[3642]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-a88028f4fa' Apr 12 19:18:37.873000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:18:37.873000 audit[1533]: AVC avc: denied { watch_reads } for pid=1533 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:18:37.873000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:18:37.873000 audit[1533]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f514dbff20 a2=10 a3=1f127282e78c395b items=0 ppid=1 pid=1533 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:37.873000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:18:37.873000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:18:37.873000 audit[1533]: AVC avc: denied { watch_reads } for pid=1533 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:18:37.873000 audit[1533]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f514dbff20 a2=10 a3=1f127282e78c395b items=0 ppid=1 pid=1533 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:37.873000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:18:37.873000 audit[1533]: AVC avc: denied { watch_reads } for pid=1533 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:18:37.873000 audit[1533]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f514dbff20 a2=10 a3=1f127282e78c395b items=0 ppid=1 pid=1533 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:37.873000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:18:38.086618 env[1469]: time="2024-04-12T19:18:38.086466393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c4b247a8-bcfa-41e8-a930-6c71652eb897,Namespace:default,Attempt:0,}" Apr 12 19:18:38.241029 systemd-networkd[1298]: cali5ec59c6bf6e: Link UP Apr 12 19:18:38.258929 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:18:38.258986 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 19:18:38.259056 systemd-networkd[1298]: cali5ec59c6bf6e: Gained carrier Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.133 [INFO][3644] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.9-k8s-test--pod--1-eth0 default c4b247a8-bcfa-41e8-a930-6c71652eb897 1707 0 2024-04-12 19:18:19 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.9 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.133 [INFO][3644] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-eth0" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.157 [INFO][3664] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" HandleID="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Workload="10.67.80.9-k8s-test--pod--1-eth0" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.177 [INFO][3664] ipam_plugin.go 268: Auto assigning IP ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" HandleID="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Workload="10.67.80.9-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000342f50), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.9", "pod":"test-pod-1", "timestamp":"2024-04-12 19:18:38.157741699 +0000 UTC"}, Hostname:"10.67.80.9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.178 [INFO][3664] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.178 [INFO][3664] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.178 [INFO][3664] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.9' Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.182 [INFO][3664] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.191 [INFO][3664] ipam.go 372: Looking up existing affinities for host host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.202 [INFO][3664] ipam.go 489: Trying affinity for 192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.206 [INFO][3664] ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.212 [INFO][3664] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.212 [INFO][3664] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.216 [INFO][3664] ipam.go 1682: Creating new handle: k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9 Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.223 [INFO][3664] ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.234 [INFO][3664] ipam.go 1216: Successfully claimed IPs: [192.168.74.132/26] block=192.168.74.128/26 handle="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.234 [INFO][3664] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.132/26] handle="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" host="10.67.80.9" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.234 [INFO][3664] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.234 [INFO][3664] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.74.132/26] IPv6=[] ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" HandleID="k8s-pod-network.3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Workload="10.67.80.9-k8s-test--pod--1-eth0" Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.237 [INFO][3644] k8s.go 385: Populated endpoint ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c4b247a8-bcfa-41e8-a930-6c71652eb897", ResourceVersion:"1707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 18, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:38.270453 env[1469]: 2024-04-12 19:18:38.238 [INFO][3644] k8s.go 386: Calico CNI using IPs: [192.168.74.132/32] ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-eth0" Apr 12 19:18:38.271210 env[1469]: 2024-04-12 19:18:38.238 [INFO][3644] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-eth0" Apr 12 19:18:38.271210 env[1469]: 2024-04-12 19:18:38.259 [INFO][3644] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-eth0" Apr 12 19:18:38.271210 env[1469]: 2024-04-12 19:18:38.259 [INFO][3644] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c4b247a8-bcfa-41e8-a930-6c71652eb897", ResourceVersion:"1707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 18, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e2:46:8b:68:63:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:38.271210 env[1469]: 2024-04-12 19:18:38.269 [INFO][3644] k8s.go 498: Wrote updated endpoint to datastore ContainerID="3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.9-k8s-test--pod--1-eth0" Apr 12 19:18:38.276365 env[1469]: time="2024-04-12T19:18:38.276332270Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:18:38.276365 env[1469]: time="2024-04-12T19:18:38.276352752Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:18:38.276365 env[1469]: time="2024-04-12T19:18:38.276359647Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:18:38.276478 env[1469]: time="2024-04-12T19:18:38.276459422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9 pid=3701 runtime=io.containerd.runc.v2 Apr 12 19:18:38.275000 audit[3706]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:18:38.275000 audit[3706]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffdff548930 a2=0 a3=7ffdff54891c items=0 ppid=2600 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.275000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:18:38.283980 systemd[1]: Started cri-containerd-3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9.scope. Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit: BPF prog-id=114 op=LOAD Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3701 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313732373565613566643638376166653562396539373561396233 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3701 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313732373565613566643638376166653562396539373561396233 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit: BPF prog-id=115 op=LOAD Apr 12 19:18:38.288000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000223a20 items=0 ppid=3701 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313732373565613566643638376166653562396539373561396233 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit: BPF prog-id=116 op=LOAD Apr 12 19:18:38.288000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000223a68 items=0 ppid=3701 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313732373565613566643638376166653562396539373561396233 Apr 12 19:18:38.288000 audit: BPF prog-id=116 op=UNLOAD Apr 12 19:18:38.288000 audit: BPF prog-id=115 op=UNLOAD Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.288000 audit: BPF prog-id=117 op=LOAD Apr 12 19:18:38.288000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000223e78 items=0 ppid=3701 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366313732373565613566643638376166653562396539373561396233 Apr 12 19:18:38.309190 env[1469]: time="2024-04-12T19:18:38.309163492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c4b247a8-bcfa-41e8-a930-6c71652eb897,Namespace:default,Attempt:0,} returns sandbox id \"3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9\"" Apr 12 19:18:38.309987 env[1469]: time="2024-04-12T19:18:38.309971626Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 19:18:38.486518 kubelet[1875]: E0412 19:18:38.486290 1875 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:38.495559 env[1469]: time="2024-04-12T19:18:38.495440637Z" level=info msg="StopPodSandbox for \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\"" Apr 12 19:18:38.530108 kubelet[1875]: E0412 19:18:38.530089 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.519 [WARNING][3750] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-csi--node--driver--q9swx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a4c5c209-9142-46fb-ae3b-3a69e8c3121d", ResourceVersion:"1626", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e", Pod:"csi-node-driver-q9swx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali34b80987103", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.519 [INFO][3750] k8s.go 585: Cleaning up netns ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.519 [INFO][3750] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" iface="eth0" netns="" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.519 [INFO][3750] k8s.go 592: Releasing IP address(es) ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.519 [INFO][3750] utils.go 188: Calico CNI releasing IP address ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.529 [INFO][3765] ipam_plugin.go 415: Releasing address using handleID ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.530 [INFO][3765] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.530 [INFO][3765] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.534 [WARNING][3765] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.534 [INFO][3765] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.536 [INFO][3765] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:38.537401 env[1469]: 2024-04-12 19:18:38.536 [INFO][3750] k8s.go 598: Teardown processing complete. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.537401 env[1469]: time="2024-04-12T19:18:38.537380413Z" level=info msg="TearDown network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\" successfully" Apr 12 19:18:38.537401 env[1469]: time="2024-04-12T19:18:38.537396140Z" level=info msg="StopPodSandbox for \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\" returns successfully" Apr 12 19:18:38.537739 env[1469]: time="2024-04-12T19:18:38.537639279Z" level=info msg="RemovePodSandbox for \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\"" Apr 12 19:18:38.537739 env[1469]: time="2024-04-12T19:18:38.537655883Z" level=info msg="Forcibly stopping sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\"" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.567 [WARNING][3793] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-csi--node--driver--q9swx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a4c5c209-9142-46fb-ae3b-3a69e8c3121d", ResourceVersion:"1626", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"ba67fd667f1b3186dc357cd308e7feaed4e8bdc2ffb58be6bc22d1aa978ea87e", Pod:"csi-node-driver-q9swx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali34b80987103", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.567 [INFO][3793] k8s.go 585: Cleaning up netns ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.567 [INFO][3793] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" iface="eth0" netns="" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.567 [INFO][3793] k8s.go 592: Releasing IP address(es) ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.567 [INFO][3793] utils.go 188: Calico CNI releasing IP address ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.583 [INFO][3806] ipam_plugin.go 415: Releasing address using handleID ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.583 [INFO][3806] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.583 [INFO][3806] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.595 [WARNING][3806] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.595 [INFO][3806] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" HandleID="k8s-pod-network.8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Workload="10.67.80.9-k8s-csi--node--driver--q9swx-eth0" Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.598 [INFO][3806] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:38.600618 env[1469]: 2024-04-12 19:18:38.599 [INFO][3793] k8s.go 598: Teardown processing complete. ContainerID="8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3" Apr 12 19:18:38.601228 env[1469]: time="2024-04-12T19:18:38.600629520Z" level=info msg="TearDown network for sandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\" successfully" Apr 12 19:18:38.602345 env[1469]: time="2024-04-12T19:18:38.602316527Z" level=info msg="RemovePodSandbox \"8ee54d9edf265f8e670ee8221b11cd6ad02d3ed8d51d8225d78e07f4ff02ecf3\" returns successfully" Apr 12 19:18:38.602799 env[1469]: time="2024-04-12T19:18:38.602737523Z" level=info msg="StopPodSandbox for \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\"" Apr 12 19:18:38.617536 sshd[3604]: Failed password for root from 158.51.96.38 port 61296 ssh2 Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.639 [WARNING][3839] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a", ResourceVersion:"1614", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791", Pod:"nginx-deployment-6d5f899847-q2j2x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali12278e0ba60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.639 [INFO][3839] k8s.go 585: Cleaning up netns ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.639 [INFO][3839] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" iface="eth0" netns="" Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.639 [INFO][3839] k8s.go 592: Releasing IP address(es) ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.639 [INFO][3839] utils.go 188: Calico CNI releasing IP address ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.653 [INFO][3851] ipam_plugin.go 415: Releasing address using handleID ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.653 [INFO][3851] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.653 [INFO][3851] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.666 [WARNING][3851] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.666 [INFO][3851] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.670 [INFO][3851] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:38.671852 env[1469]: 2024-04-12 19:18:38.670 [INFO][3839] k8s.go 598: Teardown processing complete. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.671852 env[1469]: time="2024-04-12T19:18:38.671841449Z" level=info msg="TearDown network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\" successfully" Apr 12 19:18:38.672415 env[1469]: time="2024-04-12T19:18:38.671866886Z" level=info msg="StopPodSandbox for \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\" returns successfully" Apr 12 19:18:38.672415 env[1469]: time="2024-04-12T19:18:38.672250847Z" level=info msg="RemovePodSandbox for \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\"" Apr 12 19:18:38.672415 env[1469]: time="2024-04-12T19:18:38.672287247Z" level=info msg="Forcibly stopping sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\"" Apr 12 19:18:38.676110 env[1469]: time="2024-04-12T19:18:38.676079651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:38.676977 env[1469]: time="2024-04-12T19:18:38.676933166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:38.680045 env[1469]: time="2024-04-12T19:18:38.679992245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:38.681674 env[1469]: time="2024-04-12T19:18:38.681626808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:18:38.682359 env[1469]: time="2024-04-12T19:18:38.682305780Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 19:18:38.683939 env[1469]: time="2024-04-12T19:18:38.683876977Z" level=info msg="CreateContainer within sandbox \"3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 19:18:38.690045 env[1469]: time="2024-04-12T19:18:38.690016499Z" level=info msg="CreateContainer within sandbox \"3f17275ea5fd687afe5b9e975a9b3364da9c1d0323aeca78a2f54fb8a2c8b5a9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"2327609fabcdc87871c6e377ad8bd6200ebd04651e725bd73113dd3ec8196048\"" Apr 12 19:18:38.690405 env[1469]: time="2024-04-12T19:18:38.690383856Z" level=info msg="StartContainer for \"2327609fabcdc87871c6e377ad8bd6200ebd04651e725bd73113dd3ec8196048\"" Apr 12 19:18:38.691920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount751421067.mount: Deactivated successfully. Apr 12 19:18:38.703102 systemd[1]: Started cri-containerd-2327609fabcdc87871c6e377ad8bd6200ebd04651e725bd73113dd3ec8196048.scope. Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit: BPF prog-id=118 op=LOAD Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3701 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323736303966616263646338373837316336653337376164386264 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3701 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323736303966616263646338373837316336653337376164386264 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit: BPF prog-id=119 op=LOAD Apr 12 19:18:38.713000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032dd40 items=0 ppid=3701 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323736303966616263646338373837316336653337376164386264 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.713000 audit: BPF prog-id=120 op=LOAD Apr 12 19:18:38.713000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032dd88 items=0 ppid=3701 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323736303966616263646338373837316336653337376164386264 Apr 12 19:18:38.714000 audit: BPF prog-id=120 op=UNLOAD Apr 12 19:18:38.714000 audit: BPF prog-id=119 op=UNLOAD Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:18:38.714000 audit: BPF prog-id=121 op=LOAD Apr 12 19:18:38.714000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000414198 items=0 ppid=3701 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:18:38.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323736303966616263646338373837316336653337376164386264 Apr 12 19:18:38.724545 env[1469]: time="2024-04-12T19:18:38.724507719Z" level=info msg="StartContainer for \"2327609fabcdc87871c6e377ad8bd6200ebd04651e725bd73113dd3ec8196048\" returns successfully" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.712 [WARNING][3881] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"7b4a1dc2-6d61-48d4-a9aa-08e1005ddb7a", ResourceVersion:"1614", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 17, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.9", ContainerID:"060fcb78e204383cd0978658dc29e0072999c690050d8141ac35bf478bd55791", Pod:"nginx-deployment-6d5f899847-q2j2x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali12278e0ba60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.712 [INFO][3881] k8s.go 585: Cleaning up netns ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.712 [INFO][3881] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" iface="eth0" netns="" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.712 [INFO][3881] k8s.go 592: Releasing IP address(es) ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.712 [INFO][3881] utils.go 188: Calico CNI releasing IP address ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.730 [INFO][3921] ipam_plugin.go 415: Releasing address using handleID ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.730 [INFO][3921] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.730 [INFO][3921] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.743 [WARNING][3921] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.743 [INFO][3921] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" HandleID="k8s-pod-network.d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Workload="10.67.80.9-k8s-nginx--deployment--6d5f899847--q2j2x-eth0" Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.746 [INFO][3921] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:18:38.748228 env[1469]: 2024-04-12 19:18:38.747 [INFO][3881] k8s.go 598: Teardown processing complete. ContainerID="d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647" Apr 12 19:18:38.748228 env[1469]: time="2024-04-12T19:18:38.748180409Z" level=info msg="TearDown network for sandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\" successfully" Apr 12 19:18:38.749771 env[1469]: time="2024-04-12T19:18:38.749722592Z" level=info msg="RemovePodSandbox \"d4db6c485f299a60fa8b3f8fe7c5042d6801a5f386b5b10157e2ee160bc58647\" returns successfully" Apr 12 19:18:38.824783 kubelet[1875]: I0412 19:18:38.824723 1875 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.451964845 podStartE2EDuration="19.824639185s" podCreationTimestamp="2024-04-12 19:18:19 +0000 UTC" firstStartedPulling="2024-04-12 19:18:38.309812431 +0000 UTC m=+60.044444194" lastFinishedPulling="2024-04-12 19:18:38.682486747 +0000 UTC m=+60.417118534" observedRunningTime="2024-04-12 19:18:38.824180263 +0000 UTC m=+60.558812081" watchObservedRunningTime="2024-04-12 19:18:38.824639185 +0000 UTC m=+60.559270987" Apr 12 19:18:38.895608 sshd[3604]: Connection closed by authenticating user root 158.51.96.38 port 61296 [preauth] Apr 12 19:18:38.898044 systemd[1]: sshd@15-139.178.89.219:22-158.51.96.38:61296.service: Deactivated successfully. Apr 12 19:18:38.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.219:22-158.51.96.38:61296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:38.925013 systemd[1]: Started sshd@16-139.178.89.219:22-158.51.96.38:10636.service. Apr 12 19:18:38.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.219:22-158.51.96.38:10636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:39.178378 sshd[3988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:39.177000 audit[3988]: USER_AUTH pid=3988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:39.530397 kubelet[1875]: E0412 19:18:39.530282 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:40.253031 systemd-networkd[1298]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 19:18:40.531431 kubelet[1875]: E0412 19:18:40.531307 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:18:41.258175 sshd[3988]: Failed password for root from 158.51.96.38 port 10636 ssh2 Apr 12 19:18:41.338808 sshd[3988]: Connection closed by authenticating user root 158.51.96.38 port 10636 [preauth] Apr 12 19:18:41.341341 systemd[1]: sshd@16-139.178.89.219:22-158.51.96.38:10636.service: Deactivated successfully. Apr 12 19:18:41.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.219:22-158.51.96.38:10636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:41.348334 systemd[1]: Started sshd@17-139.178.89.219:22-158.51.96.38:10638.service. Apr 12 19:18:41.349914 kernel: kauditd_printk_skb: 254 callbacks suppressed Apr 12 19:18:41.349988 kernel: audit: type=1131 audit(1712949521.340:886): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.219:22-158.51.96.38:10636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:41.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.219:22-158.51.96.38:10638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:41.423191 kernel: audit: type=1130 audit(1712949521.346:887): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.219:22-158.51.96.38:10638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:18:41.445975 sshd[3999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.51.96.38 user=root Apr 12 19:18:41.444000 audit[3999]: USER_AUTH pid=3999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:41.488565 kernel: audit: type=1100 audit(1712949521.444:888): pid=3999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.51.96.38 addr=158.51.96.38 terminal=ssh res=failed' Apr 12 19:18:41.532640 kubelet[1875]: E0412 19:18:41.532522 1875 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"